Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Technology In Action Complete, Global

Edition Alan Evans


Visit to download the full and correct content document:
https://ebookmeta.com/product/technology-in-action-complete-global-edition-alan-eva
ns/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Technology In Action Complete 16 global Edition Mary


Anne Poatsy

https://ebookmeta.com/product/technology-in-action-
complete-16-global-edition-mary-anne-poatsy/

Technology in action : complete 16th Edition Kendall E.


Martin

https://ebookmeta.com/product/technology-in-action-complete-16th-
edition-kendall-e-martin/

Business Analytics, Global Edition James Evans

https://ebookmeta.com/product/business-analytics-global-edition-
james-evans/

Business in Action, Tenth Global Edition Courtland L.


Bovée

https://ebookmeta.com/product/business-in-action-tenth-global-
edition-courtland-l-bovee/
A Simple Guide to Technology and Analytics Brian J.
Evans

https://ebookmeta.com/product/a-simple-guide-to-technology-and-
analytics-brian-j-evans/

Digital Technology in Physical Education Global


Perspectives Jeroen Koekoek

https://ebookmeta.com/product/digital-technology-in-physical-
education-global-perspectives-jeroen-koekoek/

Technology and Public Management 2nd Edition Alan R.


Shark

https://ebookmeta.com/product/technology-and-public-
management-2nd-edition-alan-r-shark/

Coding the Arduino: Building Fun Programs, Games, and


Electronic Projects (Technology in Action) Dukish

https://ebookmeta.com/product/coding-the-arduino-building-fun-
programs-games-and-electronic-projects-technology-in-action-
dukish/

The Heaviest Metals Science and Technology of the


Actinides and Beyond 1st Edition William J Evans
Timothy P Hanusa William J Evans

https://ebookmeta.com/product/the-heaviest-metals-science-and-
technology-of-the-actinides-and-beyond-1st-edition-william-j-
evans-timothy-p-hanusa-william-j-evans/
This is a special edition of an established title widely used by colleges and
GLOBAL universities throughout the world. Pearson published this exclusive edition
for the benefit of students outside the United States and Canada. If you
GLOBAL
EDITION purchased this book within the United States or Canada, you should be aware EDITION

EDITION
GLOB AL
that it has been imported without the approval of the Publisher or Author.

Technology in Action

Technology in Action
Instead of a history lesson on the microchip, we focus on tasks students can
accomplish with their computing devices and skills they can apply immediately

Complete
in the workplace, in the classroom, and at home.
—Alan Evans, Kendall Martin, and Mary Anne Poatsy

Complete
Now in its sixteenth edition, the best-selling Technology in Action continues to keep
up with the ever-increasing pace of technological change around the world, exploring
the newest gadgets, innovations, and technology trends. While today’s students
SIXTEENTH EDITION
are more comfortable with digital environments than previous generations, their
knowledge of the machines they use every day may still be limited. Drawing on their
vast experience teaching computer concepts, the authors bridge this gap by both Alan Evans • Kendall Martin • Mary Anne Poatsy
teaching the fundamentals and providing hands-on training through practical content,
Web projects, and interactive simulation activities.

Key Features
• NEW—What Do You Think? surveys at the beginning of each chapter encourage
readers to think critically, while follow-up What Do You Think Now? questions at

SIXTEENTH
EDITION
the end reinforce the concepts.
• NEW—Chew on This questions urge readers to think about the impact of
technology on society.
• Make This exercises let readers explore mobile app development in both the
Android and iOS environments through hands-on activities.
• Solve This exercises reinforce concepts and integrate them with Microsoft Office
skills.

Evans • Martin • Poatsy


• Helpdesk training modules enable readers to take on the role of a helpdesk staffer
fielding questions posed by computer users.

Available separately for purchase is MyLab IT, the teaching and learning platform that
empowers instructors to reach out to every student and, combined with our trusted
content, delivers the learning outcomes that students and instructors aspire to.

CVR_EVAN9626_16_GE_CVR.indd 1 22/06/20 12:15 PM


Don’t just read about technology, interact with it.
HELPDESKS SOUND BYTES IT SIMULATIONS
These highly-interactive, almost game- These multimedia lessons demystify IT Simulations are detailed, interactive
like simulations let you take the role of complex computer concepts with short scenarios covering the core chapter
a helpdesk staffer where you answer audio, animation, or video. The Sound topic. Students work through the
computer technology questions from Bytes now also include integrated simulations to apply what they have
customers. These simulations help learning objectives, a summary, learned and demonstrate understanding
reinforce the book content in a fun, and a quiz. in an active learning environment.
engaging way.

CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8


Technology Impacts Managing Digital Virtual Computer Enhancing Photos Technology and Digital Devices
The Impact of Artificial Media Tour with Image-Editing Ethics and Multimedia
Intelligence Understanding How to Debate Software
Intellectual Property Ethical Issues Plagiarism and CHAPTER 2 CHAPTER 9
CHAPTER 2 and Copyright Intellectual What Is Security and
Understanding Bits CHAPTER 2 Property a Computer? Privacy
and Bytes CHAPTER 9 Binary Numbers
Exploring Storage Threats to Your Interactive CHAPTER 9 CHAPTER 3 CHAPTER 10
Devices and Ports Digital Life Smartphone Are Protecting Your The Internet Program
Understanding Really Smart Computer Development
CHAPTER 3 Firewalls Managing Computer CHAPTER 4
Doing Business CHAPTER 3 Security with CHAPTER 11
Application Software
Online CHAPTER 10 Blogging Windows Tools
Databases
Evaluating Websites Understanding Finding Information CHAPTER 5
Software on the Web CHAPTER 10
System Software CHAPTER 12
CHAPTER 4 Programming Using the Arduino
Client/Server
Buying and Installing A Variety of CHAPTER 4 Microcontroller
Programming Programming with
CHAPTER 6 Networks
Software Where Does Binary
Languages the Processing Hardware
Choosing Software Show Up? CHAPTER 13
Programming for Language
CHAPTER 11 CHAPTER 7 Communicating,
CHAPTER 5 End Users
CHAPTER 11 Networks Sharing on
Starting the Using Databases
the Web
Computer: The How Businesses CHAPTER 5 Creating and
Boot Process Use Databases Using Windows Querying an
Organizing Your Task Manager to Access Database
Computer: CHAPTER 12 Evaluate System Analyzing Data with
File Management Using Servers Performance Microsoft Power
Transmission Media Hard Disk Anatomy BI Suite
CHAPTER 6 and Network
Adapters CHAPTER 6 CHAPTER 12
Evaluating Your CPU
and RAM Installing RAM Network Topology
Evaluating Computer CHAPTER 13 Installing an SSD and Navigation
System Understanding IP Drive Devices
Components Addresses, Domain A Day in the Life
Names, and CHAPTER 7 of a Network
CHAPTER 7 Protocols Technician
Installing a Home
Understanding Keeping E-Mail Computer
Secure CHAPTER 13
Networking Network
Managing and Securing Wireless Creating Web Pages
Securing Wireless Networks with Squarespace
Networks Client-Side
Web Page
Development

You will find the Helpdesks, Sound Bytes, and IT Simulations in MyLab IT.

CVR_EVAN9626_16_GE_IFC_IBC.indd 1 20/06/20 4:44 PM


16th Edition
Global Edition

Technology
in Action
Complete

Alan Evans • Kendall Martin • Mary Anne Poatsy


Vice President, Career & IT Skills: Andrew Gilfillan Lead, Production and Digital Studio: Heather Darby
Executive Portfolio Manager: Jenifer Niles Senior Manufacturing Controller, Global Edition:
Managing Producer: Laura Burgess Caterina Pellegrino
Development Editor: Shannon LeMay-Finn Course Producer: Amanda Losonsky
Associate Editor, Global Edition: Aurko Mitra Digital Content Producer: Tanika Henderson
Director of Product Marketing: Brad Parkins Media Production Manager, Global Edition: Vikram Kumar
Director of Field Marketing: Jonathan Cottrell Senior Art Director: Mary Siener
Field Marketing Manager: Bob Nisbet Cover Design: SPi Global
Product Marketing Manager: Heather Taylor Cover Image Credits: kirill_makarov/Shutterstock
Operations Specialist: Maura Garcia Text Font: 10/12 Helvetica Neue LT W1G Roman
Senior Product Model Manager: Eric Hakanson
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the
appropriate page within text.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents
and related graphics published as part of the services for any purpose. All such documents and related graphics, are provided “as is”
without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this
information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular
purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or
consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract,
negligence or other tortious action, arising out of or in connection with the use or performance of information available from the
services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are
periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the
product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version
specified.
Microsoft®, Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries.

Pearson Education Limited


KAO Two
KAO Park
Hockham Way
Harlow
Essex
CM17 9SR
United Kingdom
and Associated Companies throughout the world
Visit us on the World Wide Web at: www.pearsonglobaleditions.com
© Pearson Education Limited 2021
The rights of Alan Evans, Kendall Martin, and Mary Anne Poatsy to be identified as the authors of this work, have been asserted by
them in accordance with the Copyright, Designs and Patents Act 1988.
Authorized adaptation from the United States edition, entitled Technology in Action Complete, 16th Edition, ISBN 978-0-13-543519-9
by Alan Evans, Kendall Martin, and Mary Anne Poatsy, published by Pearson Education ©2020.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a
license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby
Street, London EC1N 8TS.
All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author
or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or
endorsement of this book by such owners. For information regarding permissions, request forms, and the appropriate contacts within
the Pearson Education Global Rights and Permissions department, please visit www.pearsoned.com/permissions/.
This eBook is a standalone product and may or may not include all assets that were part of the print version. It also does not provide
access to other Pearson digital products like MyLab and Mastering. The publisher reserves the right to remove any material in this
eBook at any time.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
ISBN 10: 1-292-34962-X
ISBN 13: 978-1-292-34962-6
eBook ISBN 13: 978-1-292-34963-3
Typeset by SPi Global

A01_EVAN9626_16_GE_FM_CR_Page.indd 2 25/06/2020 18:20


Contents at a Glance

Chapter 1
The Impact of Technology in a Changing World ....................................................................... 30

Chapter 2
Looking at Computers: Understanding the Parts ..................................................................... 64

Chapter 3
Using the Internet: Making the Most of the Web’s Resources ................................................ 108

Chapter 4
Application Software: Programs That Let You Work and Play ................................................. 148

Chapter 5
System Software: The Operating System, Utility Programs, and File Management ................. 186

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ......................................... 226

Chapter 7
Networking: Connecting Computing Devices ......................................................................... 268

Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics .......................................................... 300

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ........................................... 350

Chapter 10
Behind the Scenes: Software Programming ........................................................................... 396

Chapter 11
Behind the Scenes: Databases and Information Systems ...................................................... 440

Chapter 12
Behind the Scenes: Networking and Security in the Business World ...................................... 484

Chapter 13
Behind the Scenes: How the Internet Works .......................................................................... 526

Appendix A
The History of the Personal Computer ................................................................................... 564

Appendix B
Careers in IT .......................................................................................................................... 576

Glossary................................................................................................................................. 590

Index...................................................................................................................................... 608

3
Contents

Chapter 1
The Impact of Technology in a Changing World .................................................... 30
Part 1: Technology in Society .............................................................................................................................................. 32
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national
and global issues.
Technology in a Global Society ........................................................................................................................... 32
Impact of Tools of Modern Technology ................................................................................................................ 32
Objective 1.1 Describe various technological tools being used to impact national and global issues.
Global Issues ....................................................................................................................................................... 33
Objective 1.2 Describe various global social issues that are being affected by technology.
Technology Connects Us with Others ................................................................................................................ 34
Technology Impacts How and Why We Connect and Collaborate ........................................................................ 34
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
Technology Impacts How We Consume .............................................................................................................. 35
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services.
The Importance of Computer Literacy ............................................................................................................... 36
Computer Literacy ............................................................................................................................................... 36
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
HELPDESK: Technology Impacts ........................................................................................................................................... 36
SOUND BYTE: Virtual Computer Tour .................................................................................................................................... 37
TRY THIS: What Does Facebook Know about You? ........................................................................................... 39
MAKE THIS: TOOL: IFTTT.com (If This Then That) .............................................................................................. 40
Part 2: Emerging Technologies and Ethical Computing .................................................................................................... 41
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how
technology creates new ethical debates.
Artificial Intelligence ............................................................................................................................................. 41
Artificial Intelligence Basics .................................................................................................................................. 41
Objective 1.6 Describe artificial intelligence systems and explain their main goals.
HELPDESK: The Impact of Artificial Intelligence ...................................................................................................................... 41
ETHICS IN IT: Ethics in Computing .................................................................................................................... 44
Working with Artificial Intelligence and Other Information Technologies ....................................................... 45
Technology and Your Career ................................................................................................................................ 45
Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers.
BITS&BYTES: Is It AI or Human? Take a Turing Test! .......................................................................................... 47
DIG DEEPER: XR Extended Reality .................................................................................................................... 49
Ethical Computing ................................................................................................................................................ 50
Defining Ethics ..................................................................................................................................................... 50
Objective 1.8 Define ethics and examine various ethical systems.
SOUND BYTE: How to Debate Ethical Issues ......................................................................................................................... 50
Personal Ethics .................................................................................................................................................... 51
Objective 1.9 Describe influences on the development of your personal ethics.
Ethics and Technology ......................................................................................................................................... 53
Objective 1.10 Present examples of how technology creates ethical challenges.
SOLVE THIS: How Technology Is Used on the World Stage and in Your Personal Life ......................................... 63

4 Contents
Chapter 2
Looking at Computers: Understanding the Parts ................................................... 64
Part 1: Understanding Digital Components ....................................................................................................................... 66
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer ........................................................................................................................... 66
Computers Are Data Processing Devices ............................................................................................................ 66
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information.
Binary: The Language of Computers ................................................................................................................... 67
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
SOUND BYTE: Binary Numbers Interactive ............................................................................................................................ 67
Types of Computers ............................................................................................................................................ 69
Objective 2.3 List common types of computers, and discuss their main features.
ACTIVE HELPDESK: Understanding Bits and Bytes .............................................................................................................. 69
BITS&BYTES: Today’s Supercomputers: Faster Than Ever ................................................................................. 73
Input Devices ........................................................................................................................................................ 73
Physical Keyboards and Touch Screens .............................................................................................................. 73
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices ......................................................................................................................... 75
Objective 2.5 Describe the main types of mice and pointing devices.
DIG DEEPER: How Touch Screens Work ........................................................................................................... 76
BITS&BYTES: Distributed Computing: Putting Your Computer to Work While You Sleep .................................... 77
Image, Sound, and Sensor Input ......................................................................................................................... 77
Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
Output Devices ..................................................................................................................................................... 79
Image and Audio Output ..................................................................................................................................... 79
Objective 2.7 Describe options for outputting images and audio from computing devices.
BITS&BYTES: Foldable Phones Are Here ........................................................................................................... 81
Printers ................................................................................................................................................................ 81
Objective 2.8 Describe various types of printers, and explain when you would use them.
BITS&BYTES: CPUs That Fight Back ................................................................................................................. 84
TRY THIS: What’s Inside My Computer? ............................................................................................................ 86
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 87
Part 2: Processing, Storage, and Connectivity ................................................................................................................... 88
Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices
connect to a computer system.
Processing and Memory on the Motherboard ................................................................................................... 88
The Motherboard and Memory ............................................................................................................................ 88
Objective 2.9 Describe the functions of the motherboard and RAM.
SOUND BYTE: Smartphones Are Really Smart ...................................................................................................................... 89
Processing .......................................................................................................................................................... 89
Objective 2.10 Explain the main functions of the CPU.
Storing Data and Information .............................................................................................................................. 90
Storage Options on Computing Devices .............................................................................................................. 90
Objective 2.11 Describe the various means of storing data and information with computing devices.
ETHICS IN IT: What Is Ethical Computing? ......................................................................................................... 92
TRENDS IN IT: Green Computing (Green IT) ...................................................................................................... 93
Connecting Peripherals to the Computer .......................................................................................................... 94
Computer Ports ................................................................................................................................................... 94
Objective 2.12 Describe common types of ports used today.
HELPDESK: Exploring Storage Devices and Ports .................................................................................................................. 94

Contents 5
Power Management and Ergonomics ................................................................................................................ 95
Power Controls and Power Management ............................................................................................................. 95
Objective 2.13 Describe how to manage power consumption on computing devices.
Setting It All Up: Ergonomics ............................................................................................................................... 97
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
BITS&BYTES: Coming Soon: USB 4 and DisplayPort 2 ...................................................................................... 97
SOLVE THIS: Technology Wish List .................................................................................................................. 107

Chapter 3
Using the Internet: Making the Most of the Web’s Resources ............................. 108
Part 1: Collaborating and Working on the Web ............................................................................................................... 110
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for c ­ ollaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works ......................................................................................................................... 110
The Origin of the Internet ................................................................................................................................... 110
Objective 3.1 Describe how the Internet got its start.
How the Internet Works ..................................................................................................................................... 112
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web ............................................................................................... 113
Collaborating with Web Technologies ................................................................................................................ 113
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps ............................................................................................................ 115
SOUND BYTE: Blogging ...................................................................................................................................................... 115
Communicating over the Web ........................................................................................................................... 117
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web ..................................................................................................................... 120
Conducting Business Online .............................................................................................................................. 120
Objective 3.5 Describe how business is conducted using the Internet.
E-Commerce Safeguards .................................................................................................................................. 120
Objective 3.6 Summarize precautions you should take when doing business online.
DIG DEEPER: How Cloud Computing Works ................................................................................................... 121
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ............................................................................... 122
HELPDESK: Doing Business Online ..................................................................................................................................... 123
BITS&BYTES: Bitcoin: A Form of Virtual Currency ............................................................................................ 123
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud ................................................................ 125
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 126
Part 2: Using the Web Effectively ...................................................................................................................................... 127
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web .......................................................................................................... 127
Web Browsers ................................................................................................................................................... 127
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names ............................................................................................................... 129
Objective 3.8 Explain what a URL is and discuss its main parts.
Navigating the Web ........................................................................................................................................... 130
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ......................................................................... 131
Searching the Web Effectively ........................................................................................................................... 132
Using Search Engines ....................................................................................................................................... 132
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.

6 Contents
BITS&BYTES: Digital Assistants and Predictive Search ..................................................................................... 133
SOUND BYTE: Finding Information on the Web .................................................................................................................... 135
Evaluating Websites .......................................................................................................................................... 135
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
HELPDESK: Evaluating Websites ......................................................................................................................................... 135
TRENDS IN IT: Linked Data and the Semantic Web ......................................................................................... 136
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper? ....................................... 137
Using the Web Ethically ..................................................................................................................................... 137
Digital Activism .................................................................................................................................................. 137
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation ....................................................................................................................................................... 138
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare? ............................................. 139
ETHICS IN IT: Cyber Harassment ..................................................................................................................... 140
SOLVE THIS: Create a Report: Conducting Research on the Web .................................................................... 147

Chapter 4
Application Software: Programs That Let You Work and Play ............................. 148
Part 1: Accessing, Using, and Managing Software .......................................................................................................... 150
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best
manage your software.
Software Basics .................................................................................................................................................. 150
Application vs. System Software ........................................................................................................................ 150
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 150
Objective 4.2 Explain the differences between commercial software and open source software and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software ....................................................................................................... 151
Managing Your Software ................................................................................................................................... 151
Purchasing Software ......................................................................................................................................... 151
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce ................................................................. 152
HELPDESK: Buying and Installing Software .......................................................................................................................... 153
Installing and Uninstalling Software .................................................................................................................... 153
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat” .............................................................................................. 153
Upgrading Software .......................................................................................................................................... 154
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work ...................................................................................................... 154
Software Licenses ............................................................................................................................................. 155
Objective 4.6 Explain how software licenses function.
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 155
ETHICS IN IT: Can I Install Software That I Don’t Own? .................................................................................... 157
TRY THIS: Citing Website Sources ................................................................................................................... 159
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 160
Part 2: Application Software ............................................................................................................................................. 161
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software ................................................................................................................. 161
Productivity Software ......................................................................................................................................... 161
Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses
and features.

Contents 7
BITS&BYTES: Productivity Software Tips and Tricks ......................................................................................... 161
BITS&BYTES: How to Open Unknown File Types ............................................................................................. 162
BITS&BYTES: Going Beyond PowerPoint ......................................................................................................... 166
SOUND BYTE: Programming for End Users.......................................................................................................................... 168
Business Software ............................................................................................................................................. 170
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools ........................................................... 172
Multimedia and Educational Software .............................................................................................................. 172
Digital Multimedia Software ............................................................................................................................... 172
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software ....................................................................................................................................... 174
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software ........................................................................................................................................... 175
App Creation Software ...................................................................................................................................... 175
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror . . . ........................................................................................................................ 177
Educational and Reference Software ................................................................................................................. 177
Objective 4.12 Categorize educational and reference software and explain their features.
SOLVE THIS: Analyzing Benchmark Data ......................................................................................................... 185

Chapter 5
System Software: The Operating System, Utility Programs,
and File Management ............................................................................................ 186
Part 1: Understanding System Software .......................................................................................................................... 188
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 188
Operating System Basics .................................................................................................................................. 188
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use ................................................................................................................. 188
Objective 5.2 Explain the most popular operating systems for personal use.
BITS&BYTES: Quick Assist .............................................................................................................................. 190
BITS&BYTES: Operating Systems for the Smart Home .................................................................................... 190
Operating Systems for Machinery, Networks, and Business .............................................................................. 191
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? .................................................................. 192
What the Operating System Does ..................................................................................................................... 193
The User Interface ............................................................................................................................................. 194
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination ..................................................................................................................................... 194
Objective 5.5 Explain how the operating system helps manage hardware such as the ­processor, memory, storage, and
peripheral devices.
SOUND BYTE: Using Windows Task ­Manager to Evaluate System Performance .................................................................. 194
Software Application Coordination ..................................................................................................................... 196
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human? .................................................................. 197
Starting Your Computer ..................................................................................................................................... 198
The Boot Process .............................................................................................................................................. 198
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.

8 Contents
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 200
TRY THIS: Using Virtual Desktops in Windows 10 ............................................................................................ 202
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 203
Part 2: Using System Software ......................................................................................................................................... 204
Learning Outcome 5.2 You will be able to describe how to use system software, including the user i­nterface, file
management capabilities, and utility programs.
The Windows Interface ...................................................................................................................................... 204
Using Windows 10............................................................................................................................................. 204
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: Snip and Sketch ........................................................................................................................ 205
File Management ................................................................................................................................................ 207
Organizing Your Files ......................................................................................................................................... 207
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud .............................................................................................................. 209
BITS&BYTES: Using Storage Sense ................................................................................................................. 210
HELPDESK: Organizing Your Computer: File Management ................................................................................................... 211
Utility Programs .................................................................................................................................................. 213
Windows Administrative Utilities ......................................................................................................................... 214
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work ...................................................................................... 216
SOUND BYTE: Hard Disk Anatomy ...................................................................................................................................... 216
SOLVE THIS: Operating Systems: Analyzing Market Share ............................................................................... 225

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System .................... 226
Part 1: Evaluating Key Subsystems .................................................................................................................................. 228
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including
the CPU and memory subsystems.
Your Ideal Computing Device ............................................................................................................................ 228
Moore’s Law ..................................................................................................................................................... 228
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 229
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem ......................................................................................................................... 231
How the CPU Works ......................................................................................................................................... 231
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling ........................................................................................................................... 235
Measuring CPU Performance ............................................................................................................................ 235
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle .................................................................................................................... 237
Evaluating the Memory Subsystem .................................................................................................................. 238
Random Access Memory .................................................................................................................................. 238
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM ...................................................................................................................................................... 240
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 240
SOUND BYTE: Installing RAM............................................................................................................................................... 241
TRY THIS: Measure Your System Performance ................................................................................................. 243
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 244

Contents 9
Part 2: Evaluating Other Subsystems and Making a Decision ....................................................................................... 245
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem ................................................................................................................... 245
Types of Storage Drives ..................................................................................................................................... 245
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 246
DIG DEEPER: How Storage Devices Work ....................................................................................................... 247
Storage Needs .................................................................................................................................................. 248
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Hot Is My GPU? ................................................................................................................ 250
Evaluating the Media Subsystems .................................................................................................................... 251
Video Cards ...................................................................................................................................................... 251
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Make Your Tablet a Second Monitor .......................................................................................... 253
TRENDS IN IT: USB 3.2 C Ports: One Port to Rule Them All! ........................................................................... 254
Sound Cards ..................................................................................................................................................... 255
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components ...................................................................................................... 255
Evaluating System Reliability and Moving On ................................................................................................. 257
Maintaining System Reliability ............................................................................................................................ 257
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer ..................................................................................................................... 259
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All ................................................................................................................. 260
SOLVE THIS: Laptop Alternatives ..................................................................................................................... 267

Chapter 7
Networking: Connecting Computing Devices ....................................................... 268
Part 1: How Networks Function ........................................................................................................................................ 270
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 270
Understanding Networks ................................................................................................................................... 270
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking ............................................................................................................................... 271
Network Architectures ....................................................................................................................................... 272
Network Designs ............................................................................................................................................... 272
Objective 7.2 Explain the different ways networks are defined.
DIG DEEPER: P2P File Sharing ........................................................................................................................ 274
Network Components ........................................................................................................................................ 275
Transmission Media ........................................................................................................................................... 275
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network ........................................................................................................... 275
Basic Network Hardware ................................................................................................................................... 277
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software .............................................................................................................................................. 278
Objective 7.5 Describe the type of software necessary for networks.
TRENDS IN IT: How Smart Is Your Home? ....................................................................................................... 279

10 Contents
Connecting to the Internet ................................................................................................................................. 279
Broadband Internet Connections ....................................................................................................................... 279
Objective 7.6 Summarize the broadband options available to access the Internet.
BITS&BYTES: Net Neutrality ............................................................................................................................. 280
BITS&BYTES: Who’s Not on Broadband? ........................................................................................................ 281
Wireless Internet Access ................................................................................................................................... 281
Objective 7.7 Summarize how to access the Internet wirelessly.
TRY THIS: Testing Your Internet Connection Speed .......................................................................................... 283
MAKE THIS: TOOL: Ping and Telnet ................................................................................................................. 284
Part 2: Your Home Network ............................................................................................................................................... 285
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home n ­ etwork and
how to manage and secure a wireless network.
Installing and Configuring Home Networks ..................................................................................................... 285
Planning Your Home Network ............................................................................................................................ 285
Objective 7.8 Explain what should be considered before creating a home network.
BITS&BYTES: Power Your Devices—Wirelessly ................................................................................................ 286
Connecting Devices to a Network ..................................................................................................................... 286
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative .................................................................................. 288
BITS&BYTES: Analyzing Network Problems ..................................................................................................... 290
Managing and Securing Wireless Networks .................................................................................................... 290
Troubleshooting Wireless Network Problems ..................................................................................................... 290
Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
Securing Wireless Networks .............................................................................................................................. 290
Objective 7.11 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks ......................................................................................................................... 292
HELPDESK: Managing and Securing Your Wireless Network ............................................................................................... 292
SOLVE THIS: Home Networking Guide ............................................................................................................. 299

Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics ...................................... 300
Part 1: The Impact of Digital Information ........................................................................................................................ 302
Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used to
produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle.
Digital Basics ...................................................................................................................................................... 302
Digital Convergence and the Internet of Things .................................................................................................. 302
Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
Digital versus Analog ......................................................................................................................................... 304
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing ................................................................................................................................................ 306
e-Readers ......................................................................................................................................................... 306
Objective 8.3 Describe the different types of e-readers.
Using e-Texts ..................................................................................................................................................... 307
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media .................................................................................................................................... 307
Digital Music ....................................................................................................................................................... 308
Creating and Storing Digital Music ..................................................................................................................... 308
Objective 8.5 Describe how digital music is created and stored.
Distributing Digital Music ................................................................................................................................... 310
Objective 8.6 Summarize how to listen to and publish digital music.

Contents 11
Digital Media ....................................................................................................................................................... 311
Digital Photography ........................................................................................................................................... 311
Objective 8.7 Explain how best to create, print, and share digital photos.
SOUND BYTE: Enhancing Photos with Image-Editing Software ........................................................................................... 312
Digital Video ...................................................................................................................................................... 313
Objective 8.8 Describe how to create, edit, and distribute digital video.
TRENDS IN IT: Digital Asset Managers Needed! .............................................................................................. 316
Managing Your Digital Lifestyle ......................................................................................................................... 316
Digital Challenges and Dilemmas ....................................................................................................................... 317
Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? ........................................... 318
BITS&BYTES: The Rise of Wearable Technology .............................................................................................. 319
BITS&BYTES: Goodbye Net Neutrality. . .Hello Bandwidth Throttling ................................................................ 321
TRY THIS: Creating and Publishing a Movie ...................................................................................................... 323
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 324
Part 2: Ethical Issues of Living in the Digital Age ........................................................................................................... 325
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain
your digital reputation.
Protection of Digital Property ............................................................................................................................ 325
Intellectual Property ........................................................................................................................................... 325
Objective 8.10 Describe the various types of intellectual property.
Copyright Basics ............................................................................................................................................... 326
Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright ........................................................................................... 328
Copyright Infringement ...................................................................................................................................... 329
Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which
you can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying ................................................ 331
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission! .......................................................... 333
Living Ethically in the Digital Era ....................................................................................................................... 334
Plagiarism ......................................................................................................................................................... 334
Objective 8.13 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation ........................................................................................................................ 336
Objective 8.14 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property .............................................................................................................. 336
Protecting Your Online Reputation ..................................................................................................................... 339
Objective 8.15 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights .................................................................................................... 341
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do ............................................................... 342
SOLVE THIS: Intellectual Property and Copyright Basics .................................................................................. 349

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ....................... 350
Part 1: Threats to Your Digital Assets ............................................................................................................................... 352
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers ................................................................................................................................ 352
Identity Theft ..................................................................................................................................................... 353
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.

12 Contents
Hacking ............................................................................................................................................................. 353
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Next Generation White Hat Hackers .......................................................................................... 354
Computer Viruses ............................................................................................................................................... 357
Virus Basics ....................................................................................................................................................... 357
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches
a virus, and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 358
Types of Viruses ................................................................................................................................................ 359
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering .................................................................................................... 360
Online Annoyances ............................................................................................................................................ 361
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 363
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What? ....................................................................... 364
ETHICS IN IT: You’re Being Watched . . . But Are You Aware You’re Being Watched? ...................................... 366
HELPDESK: Threats to Your Digital Life ................................................................................................................................ 366
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches ............................................................................ 367
TRY THIS: Testing Your Network Security ......................................................................................................... 369
MAKE THIS: App Inventor 2 or Thunkable ........................................................................................................ 370
Part 2: Protecting Your Digital Property ............................................................................................................................ 371
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets ........................................................................................................ 371
Firewalls ............................................................................................................................................................ 371
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections ................................................................................................................................. 373
Objective 9.8 Explain how to protect your computer from virus infection.
HELPDESK: Understanding Firewalls ................................................................................................................................... 373
Authentication: Passwords and Biometrics ........................................................................................................ 376
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots ........................................................................... 376
Anonymous Web Surfing: Hiding from Prying Eyes ............................................................................................ 378
Objective 9.10 Describe ways to surf the Web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords! .................................................... 380
Keeping Your Data Safe ..................................................................................................................................... 380
Protecting Your Personal Information ................................................................................................................. 380
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools ....................................................................................... 380
Backing Up Your Data ....................................................................................................................................... 381
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain
the various places you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 385
Environmental Factors and Power Surges .......................................................................................................... 385
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 385
Objective 9.14 Describe the major concerns when a device is stolen and strategies for ­solving the problems.
DIG DEEPER: Computer Forensics: How It Works ........................................................................................... 387
SOLVE THIS: Computer Security ...................................................................................................................... 395

Contents 13
Chapter 10
Behind the Scenes: Software Programming ......................................................... 396
Part 1: Understanding Programming ............................................................................................................................... 398
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System ................................................................................................................. 398
The Importance of Programming ....................................................................................................................... 398
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle ........................................................................................................................ 398
Objective 10.2 Summarize the stages of the system development life cycle.
BITS&BYTES: The Agile Scrum ........................................................................................................................ 400
Life Cycle of a Program ...................................................................................................................................... 400
The Program Development Life Cycle ................................................................................................................ 400
Objective 10.3 Define programming and list the steps in the program development life cycle.
The Problem Statement ..................................................................................................................................... 401
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 401
HELPDESK: Understanding Software Programming.............................................................................................................. 402
Algorithm Development ..................................................................................................................................... 403
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Coding with a Purpose .............................................................................................................. 406
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords,
Data Types, and Operators ........................................................................................................................... 408
Coding .............................................................................................................................................................. 409
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment in coding.
Debugging ........................................................................................................................................................ 415
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display ...................................................................................................... 416
Testing and Documentation ............................................................................................................................... 416
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona ............................................................................................................... 418
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 419
Part 2: Programming Languages ...................................................................................................................................... 420
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an a ­ ppropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages ........................................................................................................................ 420
Need for Diverse Languages ............................................................................................................................. 420
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 420
Selecting the Right Language ............................................................................................................................ 421
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Learn to Code for Free at freeCodeCamp .................................................................................. 421
ETHICS IN IT: When Software Runs Awry ........................................................................................................ 422
Exploring Programming Languages ................................................................................................................. 423
Tour of Modern Languages ................................................................................................................................ 423
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio .............................................................................................................. 427
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools ............................................. 431

14 Contents
Future of Programming Languages .................................................................................................................... 431
Objective 10.12 State key principles in the development of future programming languages.
HELPDESK: A Variety of Programming Languages................................................................................................................ 432
SOLVE THIS: Time Sheets ................................................................................................................................ 439

Chapter 11
Behind the Scenes: Databases and Information Systems ................................... 440
Part 1: Database Fundamentals ........................................................................................................................................ 442
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
The Need for Databases .................................................................................................................................... 442
Database Basics ............................................................................................................................................... 442
Objective 11.1 Explain what a database is and why databases are useful.
Database Types .................................................................................................................................................. 444
Flat Databases .................................................................................................................................................. 444
Objective 11.2 Describe features of flat databases.
Relational Databases ......................................................................................................................................... 446
Objective 11.3 Describe features of relational databases.
BITS&BYTES: Normal Forms ............................................................................................................................ 447
Object-Oriented Databases ............................................................................................................................... 447
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases .............................................................................................................................. 447
Objective 11.5 Describe features of multidimensional databases.
HELPDESK: Using Databases............................................................................................................................................... 447
NoSQL Databases ............................................................................................................................................ 448
Objective 11.6 Describe how Web 2.0 data is managed in a database.
Using Databases ................................................................................................................................................. 449
Relational Database Components and Functions ............................................................................................... 449
Objective 11.7 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................................. 452
BITS&BYTES: Music Streaming Services Use Databases ................................................................................. 453
Inputting and Managing Data ............................................................................................................................. 453
Objective 11.8 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ............................................................................................. 458
BITS&BYTES: Data Dashboards: Useful Visualization Tools .............................................................................. 460
TRY THIS: Using Excel’s Database Functions ................................................................................................... 462
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 463
Part 2: How Businesses Use Databases ........................................................................................................................... 464
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to
manage data and how business information systems and business intelligence are used to make business decisions.
Data Warehousing and Storage ........................................................................................................................ 464
Data Warehouses and Data Marts ..................................................................................................................... 464
Objective 11.9 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 464
BITS&BYTES: Data Warehouses Are Going to the Cloud ................................................................................. 465
Data Mining ....................................................................................................................................................... 466
Objective 11.10 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed ................................................................................ 467
ETHICS IN IT: Data, Data Everywhere—But Is It Protected? ............................................................................. 469

Contents 15
Using Databases to Make Business Decisions ............................................................................................... 469
Business Information Systems ........................................................................................................................... 469
Objective 11.11 Describe the main types of business information systems and how they are used by business managers.
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite.............................................................................. 474
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web ...................................................... 474
TRENDS IN IT: Mobile Business Intelligence ..................................................................................................... 475
SOLVE THIS: College Database ........................................................................................................................ 483

Chapter 12
Behind the Scenes: Networking and Security in the Business World ................. 484
Part 1: Client/Server Networks and Topologies ............................................................................................................... 486
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them,
and network topologies used to construct them.
Client/Server Network Basics ........................................................................................................................... 486
Networking Advantages .................................................................................................................................... 486
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks ........................................................................................ 487
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks ........................................................................................................................ 488
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Make Your Browser Protect You! ............................................................................................... 491
Servers and Network Topologies ...................................................................................................................... 492
Servers .............................................................................................................................................................. 492
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 493
TRENDS IN IT: Virtualization: Making Servers Work Harder .............................................................................. 494
Network Topologies ........................................................................................................................................... 495
Objective 12.5 Describe the common types of network topologies and the advantages and ­disadvantages of each one.
SOUND BYTE: Network Topology and ­Navigation Devices.................................................................................................... 497
TRY THIS: Sharing Printers on a Network Using Windows ................................................................................ 502
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 503
Part 2: Setting Up Business Networks ............................................................................................................................. 504
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network
navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media ........................................................................................................................................... 504
Wired and Wireless Transmission Media ............................................................................................................ 504
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Guidance on Green Computing ................................................................................................. 506
Network Adapters and Navigation Devices ..................................................................................................... 506
Network Adapters ............................................................................................................................................. 506
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses ................................................................................................................................................ 508
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers ........................................................................................................................ 509
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and ­Network Adapters ...................................................................................................... 510
Network Operating Systems and Network Security ....................................................................................... 510
Network Operating Systems .............................................................................................................................. 511
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Extending Smart Homes: Smart Yards Coming Soon! ................................................................ 511

16 Contents
Client/Server Network Security .......................................................................................................................... 512
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards ............................................................................. 513
SOUND BYTE: A Day in the Life of a Network Technician ..................................................................................................... 514
ETHICS IN IT: How Should Companies Handle Data Breaches? ...................................................................... 517
BITS&BYTES: Logging in? Try Finger Vein Recognition ..................................................................................... 518
SOLVE THIS: Cyber-Security Flyer and Mail Merge ........................................................................................... 525

Chapter 13
Behind the Scenes: How the Internet Works ........................................................ 526
Part 1: Inner Workings of the Internet ............................................................................................................................. 528
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking ............................................................................................................. 528
Management ..................................................................................................................................................... 528
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 529
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission ............................................................................................................................................. 530
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ........................................................................................... 530
Internet Identity ................................................................................................................................................... 533
IP Addresses ..................................................................................................................................................... 533
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols ........................................................................... 533
BITS&BYTES: What’s Your IP Address? ........................................................................................................... 534
BITS&BYTES: Amazing Applications of IoT ....................................................................................................... 534
SOUND BYTE: Creating Web Pages with Squarespace ....................................................................................................... 535
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols .............................................................. 536
Domain Names ................................................................................................................................................. 537
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Scale Up for Success ................................................................................................................ 538
TRY THIS: Ping Me ........................................................................................................................................... 541
MAKE THIS: TOOL App Inventor 2 or Thunkable .............................................................................................. 542
Part 2: Coding and Communicating on the Internet ....................................................................................................... 543
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies .............................................................................................................................................. 543
Web Development ............................................................................................................................................. 543
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers ................................................................. 544
Application Architecture ..................................................................................................................................... 546
Objective 13.7 Compare and contrast server-side and client-side application software.
SOUND BYTE: Client-Side Web Page Development ............................................................................................................. 547
BITS&BYTES: Repl It ........................................................................................................................................ 549
Communications over the Internet ................................................................................................................... 549
Types of Internet Communication ...................................................................................................................... 549
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: AI and Your Inbox ...................................................................................................................... 551
Encryption ......................................................................................................................................................... 552
Objective 13.9 Explain how data encryption improves security.

Contents 17
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them! ........................................................... 553
ETHICS IN IT: Do We Really Want Strong Encryption? ..................................................................................... 554
HELPDESK: Keeping E-Mail Secure ..................................................................................................................................... 554
TRENDS IN IT: Cognitive Computing ............................................................................................................... 555
SOLVE THIS: Creating an HTML Document ..................................................................................................... 563

Appendix A
The History of the Personal Computer .................................................................. 564

Appendix B
Careers in IT ........................................................................................................... 576

Glossary������������������������������������������������������������������������������������������������������������������ 590
Index����������������������������������������������������������������������������������������������������������������������� 608

18 Contents
Learn Technology by Using
Technology in Action 16e

Technology in Action continues to be a bestseller because it delivers an engaging approach to teaching the topics and skills students
need to be digitally literate. Using practical content, hands-on projects, and interactive simulation activities, students are engaged
in learning.
Today’s students are more tech savvy than ever and they expect what they are learning in the classroom to be as current as their
Twitter feeds and social media updates Traditional print textbooks cannot keep up effectively, but e-texts and digital technology
can deliver a more up-to-date experience. So, for those customers using the Technology in Action etext, the 16th edition has been
thoroughly reviewed and updated to ensure coverage of the latest in technology. New topics such as foldable phones, CPUs that
fight back against malware, and bandwidth throttling (by ISPs) have been included and new Dig Deepers like XR Extended Reality
are included. When students read the etext, they will be learning about truly current and relevant topics.
The updates were made with the instructor in mind so that there is no real work for you to do – just know the content is timely and
check out the transition guide that provides the specifics on what has been updated or changed. The learning objectives and test
questions related to them have not been changed so that changes to your existing syllabi and quizzes should not be required. The
new features of the 16th edition are all still there, including the web-based survey activities that encourage students to engage with
their peers and develop critical thinking skills through the What Do You Think? questions. These activities along with the Tech in the
News updates at the beginning of each chapter, videos, interactive Helpdesk activities, Sound Byte lessons, IT simulations, and
a variety of hands-on projects all help students learn the concepts and skills they need to be digitally literate in today’s workplace.
And, if they are using MyLab IT, they can earn the Digital Competency badge to demonstrate their skills to potential employers.

Hallmarks
• Engaging question-and-answer writing style that helpdesk staffer assisting customers via a live chat using
approaches topics as students do. a decision-based simulation with a quiz.
• Ethics coverage throughout, including in end-of-chapter • Sound Byte audio lessons provide coverage of additional
activities, Point/Counterpoint ethical debate content found topics related to the chapter, including a brief quiz.
in relevant chapters, and a Sound Byte lesson on how to • IT Simulations provide an in-depth chapter scenario that
discuss and debate ethical issues. students work through in an active learning environment
• Hands-on learning with projects throughout each chapter: and complete with a brief quiz to demonstrate
• Try This projects allow students to practice and understanding. They have been redesigned for a more
demonstrate their proficiency with important topics. engaging and easier-to-use learning experience that helps
Each project is accompanied by a how-to video. students actively demonstrate understanding. They now
include a “presentation mode” so instructors can walk
• Solve This projects put the concepts students are
through the simulation in class or with students.
learning into action through real-world problem solving
using Microsoft Office programs. Grader project versions • Review and Quizzes
of most of these projects are in MyLab IT. • Check Your Understanding Quizzes provide a self-check
• Make This projects provide activities where students covering objectives in each part of the chapter so that
build programs that run on their mobile devices. students can see how well they are learning the content.
Twelve of the chapters have activities that build fully • The Chapter Quiz provides a way for students to test that
functional mobile apps, compatible with either Android they have learned the material from the entire chapter.
or iOS. Each project includes instructions and a • New “Chew on This” critical thinking questions require
how-to video. that students demonstrate their understanding through
• Interactive activities engage students in active learning written answers that are manually graded.
and demonstration of understanding: • Testbank Exams provide customizable prebuilt,
• Helpdesk interactive activities provide a review of autograded, objective-based questions covering the
chapter objectives by having students play the role of a chapter objectives.

Learn Technology by Using Technology in Action 16e 19


• Videos particularly online students, for instruction and
• Chapter Overview Videos provide an objective-based review.
review of what students should have learned. • Instructor Chapter Guides provide teaching tips;
• Try This and Make This project videos homework and assessment suggestions; a brief
overviews of each chapter’s Try This, Make This, and
• Helpful Resources
Solve This exercises; as well as select Sound Byte
• PowerPoint and Audio Presentations can be used
talking points and ethics debate starters.
in class for lecture or assigned to students,

What’s New?
• What Do You Think? discussion topics begin each chapter The Bits&Bytes: Is Dial-Up Still an Option? has been
with surveys that students complete. They then respond to ­updated.
follow-up questions related to the topic at the end of the The Bits&Bytes: 5G Is Coming—Is It Worth the Wait? has
chapter to encourage critical thinking. been deleted and content has been added to the text.
• Chew on This critical thinking questions at the end of each
Ethics in IT: Ethical Challenges of the Internet of Things has
chapter part, encourage students to think critically about
moved to Chapter 8.
the impact of technology on society.
A new Bits&Bytes: Power Your Devices Wirelessly has been
• Technology in the News (formerly TechBytes Weekly) lets
added.
you keep your class current with weekly technology news.
• Chapter 8 has been expanded to discuss the challenges Revisions to setting up a Windows home network have
students face in managing an active digital lifestyle such as been made to remove concept of homegroups.
the Dark Web, keeping data private, and using The Bits&Bytes: The Rise of Wearable Technology has
cryptocurrency. moved to Chapter 8.
• Images and quizzes have been updated throughout. A new Ethics in IT: Privacy Challenges of Delivering Free
• A new Try This project in Chapter 1—What Does Wi-Fi has been added.
Facebook Know About You?—lets students explore the
detailed information collected about them by the social Chapter 8
media platform. Ethics in IT: Ethical Challenges of the Internet of Things has
been relocated from Chapter 7.
A new objective, “Discuss the challenges in managing an
Summary of Chapter Updates active digital lifestyle,” has been added to the chapter.
All chapter Learning Outcomes and Learning Objectives have A new Dig Deeper, Deep Web versus Dark Web: Are There
been revised as needed and throughout the text, figures and Places You Shouldn’t Go?, has been added to the chapter.
photos have been updated with new images, current topics,
Bits&Bytes: The Rise of Wearable Technology has been
and state-of-the art technology coverage.
relocated from Chapter 7.
Chapter 1
Chapter 9
A new Try This exercise leading students through the steps to
examine the data stored about them by social media platforms A Bits&Bytes addressing the role of social media and computer
has been added. security in maintaining democratic elections has been added.

The section on technology and careers has been updated Extended treatment of password managers and biometric
with current trends and an emphasis on the impact of options for access control has been added.
artificial intelligence.
Chapter 10
Chapter 5 New coverage of programming technologies like Swift and JSON.
Discussions on additional mobile operating systems like
Chapter 11
watchOS and tvOS have been added.
The concept of flat databases has replaced discussion of lists.
Coverage of the latest smarthome devices and open-
source solutions has been added. New content of NoSQL databases has been added.

Chapter 7 The content of data staging has been updated.


The Bits&Bytes: Net Neutrality has been updated. A new Bits&Bytes: The Normal Forms has been added.

20 Learn Technology by Using Technology in Action 16e


Chapter 12 The most current coverage of cognitive computing has
A new Try This: Sharing Printers on a Network Using Windows been added.
has been added. More student-focused introduction to web frameworks and
Chapter 13 modern web technologies has been added.

Coverage of web security topics like email encryption and


­biometrics has been updated.

The Program
To maximize student results, we recommend using Technology in Action with MyLab IT,
the teaching and learning platform that empowers you to reach every student. By combining
trusted author content with digital tools and a flexible platform, MyLab IT personalizes the
learning experience and will help your students learn and retain key course concepts while
developing skills that future employers seek.
With MyLab IT for Technology in Action, students have access to all of the instruction, prac-
tice, review, and assessment resources in one place. There are two ways you can set up
your course:
1. You can choose to use the new sequential learning modules that allow you to create
activities in the order you want students to complete them, providing a consistent, mea-
surable learning experience from chapter to chapter.
2. You can take a second approach for an interactive learning experience, where
students use the etext to read and learn actively with Helpdesk activities, Sound Bytes,
IT ­Simulations, What do You Think? ­surveys and critical thinking questions, videos, and
more. You assign the etext chapter, students engage in learning and practice, and go
back to their assignments to take the chapter quizzes.

Solving Teaching and Learning Challenges


Technology in Action, 16e provides a hands-on approach to learning computer
­concepts in which students learn a little and then apply what they are learning in a
project or simulation or watch a video to dive deeper. And with the new What do you
think? surveys at the beginning of each chapter, the follow-up question at the end of
the chapter related to the survey results, as well as new Chew on This critical thinking
questions at the end of each chapter part, ­students are encouraged to think critically
about the impact of technology on society.
The optimal way to experience Technology in Action is with MyLab IT. All of the instruction,
practice, review, and assessment resources are in one place, allowing you to arrange your
course from an instructional perspective that gives students a consistent, measurable learn-
ing experience from chapter to chapter.

Developing Employability Skills


Digital literacy is a top skill required in today’s job market! Developing these skills involves
conceptual as well as hands-on learning. With Technology in Action, students get both—they
learn the fundamentals of computers and have opportunities to apply what they are learning
in real-world projects and simulations. Using MyLab IT and Technology in Action, students
can learn, practice, and demonstrate their digital literacy.

Learn Technology by Using Technology in Action 16e 21


• High-Demand Office Skills are evaluated in the auto-graded Solve This projects in each
chapter.
• Essential Digital Literacy Skills are taught and practiced throughout the book in Try This,
Solve This, and Make This projects.

Employability Skills Matrix (ESM)

Interactives:
Ethics Try This Solve This Make This What do Helpdesks, Sound Team Time
Projects Projects Projects Projects you think? Bytes, IT Sims Projects Badge

Critical
x x x x X
Thinking

Communication x x x X

Collaboration x x x X

Knowledge
Application and x X x x x x X
Analysis

Social
x X x
Responsibility

22 Learn Technology by Using Technology in Action 16e


Applied Learning Opportunities Throughout
Using MyLab IT with Technology in Action provides students with a variety of ways to get instruction, practice, review,
and assessment.
Technology in the News
Formerly TechBytes Weekly, these weekly currency updates deliver the latest technology news stories to you to use in your classroom.

Try This Projects Make This Projects


Try This Make This TOOL: App Inventor 2 or Thunkable

These projects have students What’s Inside My Computer?


These hands-on activities A Mobile App

apply what they are learning in Understanding what capabilities your current computer has is one of the first steps toward computer literacy. In this
exercise, you’ll learn how to explore the components of your Windows computer. For step-by-step instructions, watch
the Chapter 2 Try This video on MyLab IT.
lead students to explore Want to build your own Android app from scratch? You can, with a
simple tool called App Inventor. To get started, have ready:

a practical project that uses Step 1 To gather information about the storage devices on your computer, click File Explorer from the Taskbar. Then in the nav-
igation pane, click This PC to display information about your computer’s storage devices and network locations.
mobile app development • A computer connected to a Wi-Fi network
• The Chrome browser

(Copyright MIT, used with permission.)


skills they’ll need in the work- Click to launch File Explorer
in either an Android or • A Google account
• The MIT AI2 Companion app (available in the Google Play Store)
• [optional] An Android device connected to the same Wi-Fi network

force and everyday life. Each


(Courtesy of Microsoft Corporation)
iOS environment.
Step 2 The This PC window displays infor-

project includes a video to mation about internal storage devices


(such as internal hard drives), optical
storage devices (such as DVD drives),
and portable storage devices (such as
Ribbon In this exercise, you’ll explore the App
Inventor tool and begin working with your
first simple app. As you’ll see, making your

guide students through the flash drives and external hard drives). device work for you is as easy as drag and
To display the System screen, click the drop with App Inventor.
Computer tab on the ribbon, and then
click System properties. App Inventor is a programming platform

project.
used to create apps for Android devices.
Using App Inventor, you can easily drag
and drop components to design your app’s

(Copyright MIT, used with permission.)


interface and its behavior.
(Courtesy of Microsoft Corporation)

Step 3 Scroll down and you can gather quite a bit of Clock speed
Processor info
information from the About screen, such as:
• Version of Windows
• Type of processor
• Speed of the processor
• Amount of RAM installed
RAM info
• System type (32-bit or 64-bit)

System type

To create iOS apps, go to Thunkable.com, a programming platform


Windows version based on App Inventor.
For the detailed instructions for this exercise, go to MyLab IT.

(Courtesy of Microsoft Corporation)

Make This 59
58 Chapter 2 Looking at Computers: Understanding the Parts

Helpdesk Activities
The Helpdesk training content,
created specifically for Tech- Solve This Projects
nology in Action, enables stu- Solve This MyLab IT Grader

dents to take on the role of a These exercises inte- Technology Wish List
You are in need of a significant technology upgrade, and your parents have told you they will help you finance your purchases by
loaning you the money. You will need to repay them with a modest 2.5% interest rate over two years. The only catch is that they

grate and reinforce


want you to create a list of all the new devices that you need, note the cost, and provide a website for each device where they can
find more information. Then, they want you to calculate how much you will need to give them each month to pay them back.

helpdesk staffer fielding ques- You will use the following skills as you complete this activity:

chapter concepts with


• Merge and Center • Modify Column Widths

tions posed by computer


• Modify Workbook Themes • Insert a Hyperlink

• Apply Number Formats • Create a Formula

users so that students demon- Microsoft Office skills. • Use the SUM, PMT, and COUNTA Functions

Instructions
• Wrap Text

1. Open TIA_Ch2_Start.docs and save as TIA_Ch2_LastFirst.docx.


2. Format the title in cell A1 with the Title Cell Style, and format the column headers in cells A3:F3 with the Heading 3 Cell Style.

strate their understanding in Hint: To format cell styles, on the Home tab, in the Styles group, click Cell Styles.
3. Merge and Center A1 across columns A through F, and Center align the column headers in cells A3:F3.
Hint: To Merge and Center text, on the Home tab, in the Alignment group, click Merge & Center.
4. Modify column widths so that Column A is 25 and Column D is 45.

an active learning environ- Hint: To modify column widths, on the Home tab, in the Cells group, click Format, and then select Column Width.
5. In cells B4:E9, fill in the table with the Brand and Model of the six devices that you would like to purchase. The device
type is filled out for you. In the Reason column, write a brief note as to why this device will help you. (You’ll format the
text so it all displays later.) Enter the cost of the device in the Cost column. Don’t include tax and/or shipping.

ment. Each Helpdesk ends 6. Change the Workbook Theme to Integral.


Hint: To apply the Theme, on the Page Layout tab, in the Themes group, click Themes.
7. In cells F4:F9, create a Hyperlink to a webpage that features each respective product so your grandparents can have
access to more information if they need it. Ensure that each hyperlink includes the URL to the exact webpage for the

with a quiz, ensuring students


device in the Address, but displays the Make/Model of the device in the worksheet.
Hint: To insert a hyperlink, on the Insert tab, in the Links group, click Hyperlink. In the Insert Hyperlink dialog box, enter
the URL in the Address box and enter the Make/Model in the Text to display box.
8. Wrap the text in cells C4:C9, D4:D9, and F4:F9 so all text displays.

have grasped the content.


Hint: To wrap text, on the Home tab, in the Alignment group, click Wrap Text.
9. Format the values in cells E4:E9 with the Accounting Number format with two decimals.
Hint: To apply number and decimal formats, look on the Home tab, in the Number group.
10. In cell A10, type Subtotal, then in cell E10 use a SUM function to calculate the total cost of all devices. Format the
results in the Accounting Number format with two decimals.
Hint: To apply number and decimal formats, look on the Home tab, in the Number group.

Sound Bytes
11. In cell A11, type Estimated Tax, then in cell E11 create a formula that references the subtotal in cell E10 and multiplies
it by a tax of 6%. Format the results in the Accounting Number format with two decimals.
Hint: The formula will be =E10*0.06
12. In cell A12, type Estimated Shipping, then in cell E12 create a formula to calculate the shipping charge by using the
COUNTA function to determine the number of devices being purchased and then multiplying that by a $10 shipping
charge. Format the results in Accounting Number Format with two decimals.

Sound Bytes expand student Hint: The formula will be =COUNTA(B4:B9)*10.


13. In cell A13, type Total Cost, then in cell E13 use the SUM function to create a formula that adds up the Subtotal, Estimated
Tax, and Estimated Shipping costs. Format the results in Accounting Number Format with two decimals. Format the cells
A13:E13 with the Total Cell Style.

mastery of complex topics


14. Right align cells A10:A13.
15. In cell D14, type Estimated Monthly Payment, and then in cell E14 use the PMT function to calculate the monthly
payment owed to your parents to pay back the total purchase amount in two years at a 2.5% annual interest rate.
Hint: The formula will need to adjust the annual interest rate to a monthly rate, and adjust the annual term of the loan

through engaging lessons with


to monthly payments.
16. Save the workbook and submit based on your instructor’s directions.
Chapter Review 79

a brief quiz to check


understanding.

IT Simulations
These detailed interactive scenarios cover a core chapter topic in a hands-on environment
where students can apply what they have learned and demonstrate understanding through
active engagement.

Learn Technology by Using Technology in Action 16e 23


Instructor Teaching Resources
This program comes with the following teaching resources.
Supplements available to instructors at
Features of the Supplement
www.pearsonglobaleditions.com
Accessible PowerPoint Presentation PowerPoints meet accessibility standards for students with
disabilities. Features include, but are not limited to:
• Keyboard and Screen Reader Access
• Alternative Text for Images
• High Color Contrast between Background and Foreground Colors

End-of-Chapter Answer Key, Check Your Understanding Answers to all end-of-chapter questions.
Answer Key, Chapter Quiz Answer Key

Image Library Every image in the book.

Instructor Chapter Guide • Content Instruction


• Student Preparation and Review
• Active Learning Options
• Chapter Assessment
• End-of-Chapter Exercises
• Currency Topics
• Soft Skills and Team Work
• Instructor Resources

Make This Projects Activities where students build programs that run on their mobile
devices. Each project includes instructions and a how-to video.
Objectives Mapping Outline of the objectives in every chapter.
Solve This Projects Real-world problem solving using Microsoft Office programs.
Grader versions of most of these projects are in MyLab IT.
Syllabus Template Sample syllabus for help in setting up your course.
Test Bank (Textbook, Helpdesk, Sound Bytes) Over 1,000 multiple-choice, true/false, short-answer, and
matching questions with these annotations:
• Difficulty level (1 for straight recall, 2 for some analysis, 3 for
complex analysis)
• Objective, which provides location in the text
Provided for:
• Textbook
• Helpdesk
• Sound Byte

Computerized TestGen TestGen allows instructors to:


• Customize, save, and generate classroom tests
• Edit, add, or delete questions from the Test Item files
• Analyze test results
• Organize a database of tests and student results

Transition Guide Detailed explanation of changes between the previous and


current edition.
Web Projects Discussion questions and additional projects that can be done on
the Internet.

24 Learn Technology by Using Technology in Action 16e


Letter from the Authors

Our 16th Edition—A Letter from the Authors


Why We Wrote This Book
The pace of technological change is ever increasing.
In education, we have seen this impact us more than
ever recently—the Maker movement, the Internet of
Things, MOOCs, touch-screen mobile delivery, and
Hangouts are now fixed parts of our environment.
Even the most agile of learners and educators need
support in keeping up with this pace of change. Our
students have easier access to more information than any
generation before them. We recognize the need for them
to be able to think critically and investigate the data they
see. In this edition, we introduce the use of chapter-open-
ing features called What do you think? that allow students to critically think about a chapter topic.
Students then follow up at the end of the chapter by answering additional related critical thinking
questions in a What do you think now? feature.
We have also responded by integrating material to help students develop skills for web applica-
tion and mobile programming. We see the incredible value of these skills and their popularity with
students and have included Make This exercises for each chapter. These exercises gently bring the
concepts behind mobile app development to life. In addition, there is a Solve This exercise in each
chapter that reinforces chapter content while also applying Microsoft Office skills. These projects help
to promote students’ critical-thinking and problem-solving skills, which employers value highly.
The Helpdesk and Sound Byte training modules and IT Simulations continue to provide students
with an active learning environment in which they can reinforce their learning of chapter objectives. In
this edition, we have put the spotlight on critical thinking. We've integrated real-time surveys on im-
portant technology topics to foster classroom discussion and analytical skills. We have also included
additional material on key challenges of a digital lifestyle, such as using digital currency, avoiding the
Dark Web, and protecting privacy.
We also continue to emphasize the many aspects of ethics in technology debates. Some of the
Helpdesks and IT Simulations support instruction on how to conduct thoughtful and respectful dis-
cussion on complex ethical issues.
Our combined 70 years of teaching computer concepts have coincided with sweeping innovations
in computing technology that have affected every facet of society. From iPads to Web 2.0, comput-
ers are more than ever a fixture of our daily lives—and the lives of our students. But although today’s
students have a much greater comfort level with their digital environment than previous generations,
their knowledge of the machines they use every day is still limited.
Part of the student-centered focus of our book has to do with making the material truly engaging
to students. From the beginning, we have written Technology in Action to focus on what matters
most to today’s student. Instead of a history lesson on the microchip, we focus on tasks students
can accomplish with their computing devices and skills they can apply immediately in the workplace,
in the classroom, and at home.
We strive to keep the text as current as publishing timelines allow. Because electronic media can
be updated without the expense of a full edition we have reviewed all content to make sure it is the
most current. The field of technology changes swiftly and the social impacts of technology seem to
be changing even more quickly. We are excited that the text can be delivered to your students with
the confidence that it reflects current events and technical specifications.

Letter from the Authors 25


We also continue to include a number of multimedia components to enrich the classroom and stu-
dent learning experience. The result is a learning system that sparks student interest by focusing on the
material they want to learn (such as how to integrate devices into a home network) while teaching the
material they need to learn (such as how networks work). The sequence of topics is carefully set up to
mirror the typical student learning experience.
As they read this text, your students will progress through stages and learning outcomes of increas-
ing difficulty:
• Thinking about how technology offers them the power to change their society and their world and
examining why it’s important to be computer fluent
• Understanding the basic components of computing devices
• Connecting to and exploring the Internet
• Exploring application software
• Learning about the operating system and personalizing their computer
• Evaluating and upgrading computing devices
• Understanding home networking options
• Creating digital assets and understanding how to legally distribute them
• Keeping computing devices safe from hackers
• Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key concepts. We
continue to design the text around learning outcomes and objectives, making them a prominent part
of the chapter structure. Students will see the learning outcomes and objectives in the chapter opener,
throughout the text itself, as well as in the summary so they understand just what they are expected to
learn.
We also continue to structure the book in a progressive manner, intentionally introducing on a basic
level in the earlier chapters concepts that students traditionally have trouble with and then later expand-
ing on those concepts in more detail when students have become more comfortable with them. Thus,
the focus of the early chapters is on practical uses for the computer, with real-world examples to help
the students place computing in a familiar context. For example, we introduce basic hardware com-
ponents in Chapter 2, and then we go into increasingly greater detail on some hardware components
in Chapter 6. The Behind the Scenes chapters venture deeper into the realm of computing through
in-depth explanations of how programming, networks, the Internet, and databases work. They are spe-
cifically designed to keep more experienced students engaged and to challenge them with interesting
research assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several
problem-solving, hands-on activities that can be carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development in both the Android and iOS environments.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to reinforce the
material taught in the text and to support both classroom lectures and distance learning:
• New chapter-opening features called What do you think? allow students to critically think about a
chapter topic. Students then follow up at the end of the chapter by answering additional related
critical thinking questions in a What do you think now? feature.
• New Chew on This critical-thinking questions require that students demonstrate their
understanding through written answers that are manually graded.
• The Helpdesk training content, created specifically for Technology in Action, enables students to
take on the role of a helpdesk staffer fielding questions posed by computer users so that students
can demonstrate their understanding in an active learning environment.
• Sound Bytes expand student mastery of complex topics through engaging lessons with a brief
quiz to check understanding.

26 Letter from the Authors


• IT Simulations are detailed, interactive scenarios covering the core chapter topic. As students work
through the simulation, they apply what they have learned and demonstrate understanding in an
active learning environment.
• The What’s New in Technology (formerly TechBytes Weekly) is a weekly currency update that
delivers the latest technology news stories to you for use in your classroom. In addition, the
currency items have discussion points or activities included.

Letter from the Authors 27


About the Authors

Alan Evans, MS, CPA


aevans@mc3.edu
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer science
and business courses. He holds a BS in accounting from Rider University and
an MS in Information Systems from Drexel University, and he is a certified public
accountant. After a successful career in business, Alan finally realized that his
true calling is education. He has been teaching at the college level since 2000. He enjoys attending
technical conferences and exploring new methods of engaging students.

Kendall Martin, PhD


kmartin@mc3.edu
Kendall is a full professor of Computer Science at Montgomery County Community
College with teaching experience at both the undergraduate and graduate levels
at a number of institutions, including Villanova University, DeSales University,
Ursinus College, and Arcadia University. Her education includes a BS in electrical
engineering from the University of Rochester and an MS and a PhD in engineering
from the University of Pennsylvania. Kendall has industrial experience in research and development
environments (AT&T Bell Laboratories) as well as experience with several start-up technology firms.

Mary Anne Poatsy, MBA


mpoatsy@mc3.edu
Mary Anne is a senior faculty member at Montgomery County Community
College, teaching various computer application and concepts courses in face-
to-face and online environments. She enjoys speaking at various professional
conferences about innovative classroom strategies. Mary Anne holds a BA
in psychology and education from Mount Holyoke College and an MBA in
finance from Northwestern University’s Kellogg Graduate School of Management. She has been in
teaching since 1997, ranging from elementary and secondary education to Montgomery County
Community College, Gwynedd-Mercy College, Muhlenberg College, and Bucks County Community
College, as well as training in the professional environment. Before teaching, Mary Anne was a vice
president at Shearson Lehman Hutton in the Municipal Bond Investment Banking Department.

28 About the Authors


Acknowledgments
For my wife, Patricia, whose patience, understanding, and support continue to make this work possible, espe-
cially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the best way to
achieve your goals is to constantly strive to improve yourself through education.
—Alan Evans
For all the teachers, mentors, and gurus who have popped in and out of my life.
—Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me throughout this
process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love have been inspiring.
—Mary Anne Poatsy
First, we would like to thank our students. We constantly learn from them while teaching, and they are a continu-
al source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children
made sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals
deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive
Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and
change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and
management skills helped make this book a reality. We also would like to extend our appreciation to Pearson
Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our
book is published on time and looks fabulous. The timelines are always short, the art is complex, and there are
many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend our thanks
to the media and MyLab IT team—Eric Hakanson, Becca Golden, Amanda Losonsky, and Heather Darby—for all
of their hard work and dedication.
There are many people whom we do not meet at Pearson and elsewhere who make significant contributions
by designing the book, illustrating, composing the pages, producing the media, and securing permissions. We
thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and
talents to this project. We appreciate their time and energy, as their comments help us turn out a better product
each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by
creating the infographics for this text.

Acknowledgments for the Global Edition


Pearson would like to thank and acknowledge the following people for their contributions to the Global
Edition.

Contributors
S. H. Chung – Wawasan Open University
Ajay Mittal – University Institute of Engineering and Technology

Reviewers
Kaushik Goswami – St. Xavier’s College, Kolkata
Mazani Manaf – Universiti Teknologi MARA
Moumita Mitra Manna – Bangabasi College
Sandeep Singh – Jaypee Institute of Information Technology

About the Authors 29


Chapter

1
The Impact of Technology
in a Changing World
For a chapter overview, watch the Chapter Overview videos.

PART 1 PART 2

Technology in Society Emerging Technologies and Ethical Computing


Learning Outcome 1.1 
You will be able to discuss the impact Learning Outcome 1.2 
You will be able to describe emerging
of the tools of modern technology on technologies, such as artificial
national and global issues. ­intelligence, and how technology
creates new ethical debates.

Technology in a Global Society 32 Artificial Intelligence 41


Objective 1.1 Describe various technological tools being used to Objective 1.6 Describe artificial intelligence systems and explain
impact national and global issues. their main goals.
Objective 1.2 Describe various global social issues that are being Helpdesk: The Impact of Artificial Intelligence
affected by technology.

 orking with Artificial Intelligence and


W
Technology Connects Us with Others 34
Other Information Technologies 45
Objective 1.3 Describe how technology is changing how and why
Objective 1.7 Describe how artificial intelligence and other emerging
we connect and collaborate with others.
technologies are important in many careers.
Objective 1.4 Summarize how technology has impacted the way we
choose and consume products and services.
Helpdesk: Technology Impacts
Ethical Computing 50
Objective 1.8 Define ethics and describe various ethical systems.
The Importance of Computer Literacy 36 Objective 1.9 Describe influences on the development of your
­personal ethics.
Objective 1.5 Characterize computer literacy and explain why it is
important to be computer literate. Objective 1.10 Present examples of how technology creates ethical
challenges.
Sound Byte: Virtual Computer Tour
Sound Byte: How to Debate Ethical Issues

MyLab IT All media accompanying this chapter can be found here. Make This A Virtual Assistant on page 40

(John M Lund Photography Inc/The Image Bank/Getty Images; Carlos Castilla/Shutterstock; Winui/Shuttertock; Ivan Trifonenko/123RF; Sergey Nivens/Shutterstock; Stuart
Miles/Fotolia)

30
JournalismCS
RoboticsCS
EducationCS
Psychology CS
MedicineCS
LiteratureCS
Theater CS
Biology CS
EconomicsCS
What do you think? HumanitiesCS
Having a background in technology and computer science enables you to be
a powerful contributor in many career fields. More universities are realizing this and
creating a new department, CS + X. What is CS + X? The CS stands for Computer
Science, while the X stands for a second area of study that blends with computer
technology. For example, the X might be Music, with the combined degree including
study of the perception of music and use of digital programming to create new
instruments. Or the X might be Archaeology, with the curriculum including courses
on the computer simulation of human behavior and creating virtual reality models.
Universities that are creating CS + X departments argue that combining computer
science with other skills produces students who are better journalists, artists,
scientists, and so on. The possibilities for collaboration between your passions and
technology are endless.

Which field would you be most curious about combining with CS?
• Literature • Nursing • Art
• Statistics • Criminal Justice • Other
• Business • Anthropology

31
See the end of the chapter for a follow-up question. (Jacob Lund/Shutterstock)
Part 1 For an overview of this part of the chapter, watch Chapter Overview Video 1.1.

Technology in Society
Learning Outcome 1.1  You will be able to discuss the impact of the tools of modern technology on
national and global issues.
Ask yourself: Why are you in this class? Maybe it’s a requirement for your degree, or maybe you want to improve your computer
skills. But let’s step back and look at the bigger picture.
Technology is a tool that enables us all to make an impact beyond our own lives. We’ve all seen movies that dangle the dream in
front of us of being the girl or guy who saves the world—and gets to drive a nice car while doing it!
Technology can be your ticket to doing just that by influencing and participating in projects that will change the world.

Technology in a Global Society


Recent national and global issues are showing that technology is accelerating change around the
world and galvanizing groups of people in new ways. Let’s look at a few examples.

Impact of Tools of Modern Technology


Objective 1.1 Describe various technological tools being used to impact national and global
issues.

Social Media Tools


Social media platforms like Twitter, Facebook, and Instagram enable people to connect and
exchange ideas. These platforms also bring together people facing similar problems to fight for
social change. For example, the Twitter hashtag #MeToo began as a way of supporting women
facing sexual harassment and assault but evolved
to galvanize an international movement. A simple
hashtag brought to light an important social issue
and was a key means for revealing how widespread
the problem was.
How we conduct informed discussion in the age
of social media is still developing, however. Bot
accounts, automated programs retweeting news
stories and quotes, have been used to create
discord around controversial topics in many
­countries—enflaming the gun control debate in
the United States or fanning prejudice into vio-
lence in Sri Lanka. For these and other reasons,
knowing how to use and critically evaluate social
media is an important skill needed by all (see
Figure 1.1).

Crisis-Mapping Tool
Another example of the interaction of technology
and society is the software tool Ushahidi. Following
a disputed election in Kenya, violence broke out all
over the country. Nairobi lawyer Ory Okolloh tried to
get word of the violence out to the world through her
blog, but she couldn’t keep up with the volume of
Figure 1.1 Social media has changed how we access, distribute, and evaluate reports. However, two programmers saw her request
information. (Rudmer Zwerver/Shutterstock) for help and in a few days created Ushahidi. It is a

32 Chapter 1 The Impact of Technology in a Changing World


Figure 1.2 Ushahidi crisis-mapping software has been used to ­identify areas of violence against women in India.
(Pixhall/Alamy Stock Photo)

crisis-mapping tool that collects information from e-mails, text messages, blog posts, and tweets
and then maps them, instantly making the information publicly available. The developers then made
Ushahidi a free platform anyone in the world can use (see Figure 1.2). It has since been used in sev-
eral international disasters. In what other ways may technology help us face times of crisis?

Global Issues
Objective 1.2 Describe various global social issues that are being affected by technology.
Let’s look at the different global social issues that are being affected by technology.

Health Care
Infectious diseases account for about one-fifth of all deaths worldwide. Researchers say the odds of
a flu pandemic occurring in the next century are nearly 100%. Could technology help us develop and
deliver vaccines to save lives? Using scientific visualization tools, scientists are developing antibodies for
flu viruses and even HIV, viruses that are difficult to target because they continually change shape. Com-
putationally intense modeling software is helping researchers increase the pace of vaccine production.
As we learn more about the terrible consequences of concussion injuries, technology is playing a
part in providing a solution. Researchers now know that even without an actual concussion, ath-
letes can sustain serious damage from repeated impacts of their brain against the skull. Computer
programs have collected sensor data from impacts on the field, which scientists have analyzed and
used to create a new kind of helmet. College programs and the NFL now use enhanced helmets,
designed to better distribute the impact of collisions.

The Environment
What if every cell phone in the world had built-in atmospheric sensors? Then millions of points of
data measuring air and water quality from around the world could be acquired. The data could be
tagged with geographical information, alerting scientists to new trends in our environment. Ideas
like these are being explored by researchers around the world.
Smart Internet-connected water sprinklers are another technology that is already saving water in
California and other dry areas of the country. The sprinkler system checks the weather forecast so it won’t
use water when rain is coming the next day. The system is showing a 30% reduction in water usage.

Technology in a Global Society 33


The Digital Divide
There is a serious gap in the levels of Internet access and the availability of technical tools in differ-
ent regions of the world. The term for this difference in access to technology is the digital divide.
One danger of a digital divide is that it prevents us from using all the minds on the planet to solve
global problems. But this challenge created by technology is also being answered by it.
The Next Einstein Initiative (NEI) is a plan to focus resources on the talented mathematical minds
of Africa (see Figure 1.3). Cambridge professor Neil Turok founded the African Institute of Mathe-
matical Sciences (AIMS) to bring together the brightest young minds across Africa with the best
Figure 1.3 The Next Einstein
lecturers in the world. By capturing the enthusiasm of the world with presentations distributed
Initiative (NEI) is rallying the
through TED (ted.com) and Google’s Project 10100, there is now a push to create additional AIMS
support of the world to identify and
centers across Africa.
encourage mathematical genius.
(Alistair Cotton/123RF) Table 1.1 shows additional examples of people putting technology into action to impact the world.
How will you join them?

Table 1.1 Technology in Action: Taking on Global Problems


Person/
Organization Global Problem Technology Used Action Find Out More . . .

Start Network Corruption Blockchain, a digitized Blockchain technology can help Start Network:
public ledger for track humanitarian aid funds startnetwork.org
recording a series of as they flow from donors to
transactions recipients.

SolaRoad/ The need for Solar cells Solar cells are integrated into the Netherlands SolaRoad:
Netherlands a renewable, asphalt roadway. They collect solaroad.nl
nonpolluting energy solar energy and distribute
resource electricity all day.

United Nations Issues of hunger for GIS (geographical The WFP can analyze the location World Food
World Food 1 in 7 of the world’s information systems) and need for food, positioning it Programme:
Programme population and mobile devices where it will help the most. wfp.org
(WFP)

Gates The threat of global Mobile apps, data Worldwide organizations like the Gates Foundation:
Foundation pandemic disease, like analytics, and enhanced Gates Foundation are taking steps gatesfoundation.org
Ebola, or weaponized global communications to build better networks to detect
biological warfare outbreaks and deliver vaccines.

Technology Connects Us with Others


Technology is also allowing us to redefine fundamental parts of our social makeup—how we think,
how we connect with each other, and how we purchase and consume products.

Technology Impacts How and Why We Connect and Collaborate


Objective 1.3 Describe how technology is changing how and why we connect and collabo-
rate with others.

Collaborating for the Benefit of Others


With the arrival of many web applications that allow individuals to become “creators” of the web, a
new kind of Internet has come into being. Nicknamed Web 2.0, the web now allows users to easily
contribute content and connect with each other. Web 2.0 has fostered a dramatic shift across the

34 Chapter 1 The Impact of Technology in a Changing World


world, from simply consuming to having the ability to volunteer and
collaborate on projects. The term cognitive surplus was coined to
reflect the combination of leisure time and the tools to be creative.
The availability of media tools and the easy connectivity of Web 2.0,
along with generosity and a need to share, also enable projects like
Ushahidi to emerge.

Connecting Through Business


One of the most profound ways we can connect with each other is
to support other people’s dreams. Someone with an idea can begin
by building a first attempt at an area makerspace. Then by posting a
launch video on a site like Kickstarter that person can reach people
who believe in the idea. Donors agree to put money forward, knowing
the product may not come to fruition, in exchange for special rewards
like a discounted price or a special color version. This means of gen-
erating capital to start a business is known as crowdfunding, asking
for small donations from a large number of people. Over $4 billion of
funding for businesses has been raised using Kickstarter. Business
ideas are not the only projects benefiting from crowdfunding. Sites
like GoFundMe allow people to crowdfund to raise money for things
such as medical bills or tuition.

Technology Impacts How We Consume


Objective 1.4 Summarize how technology has impacted the way
we choose and consume products and services.
Technology is also changing how we decide what we’ll purchase and
how we actually buy goods and services.

Marketing
There are almost 2 billion views of videos each month on YouTube,
and marketers are taking note. Influencers are YouTube personalities
with huge followings and high levels of interaction with their followers.
Placing a product for review on their channel or showing a popular
YouTube celebrity using that product in their own life can be a huge
marketing win.

Marketers also have to be aware of the phenomenon of crowdsourc-


ing—checking in with the voice of the crowd. Frito-Lay’s “Do Us a
Flavor” campaign asked customers to vote online for what flavor
chips to make next. The Lego Ideas website lets fans contribute proj-
ects they would like to see and the most popular are produced for
sale. Marketing has shifted to take advantage of our digital lifestyle.

Access Versus Ownership


Even the idea of ownership is evolving. Items like cars and bikes can
now be “subscriptions” instead of purchases. Services like Uber and
Lyft let you use your car to provide rides for others while Zipcar allows
you to use a shared car whenever you need it. Bicycles can be shared
in most cities with programs like New York City’s Citi Bike. It typically
supports almost 80,000 rides per day. These new sharing options have
revolutionized the transportation industry (see Figure 1.4).

Such collaborative consumption implies that we are joining together


as a group to use a specific product more efficiently. There are
increasing opportunities to share the services a product provides Figure 1.4 With smartphones and constant networking, sharing
instead of owning it outright. Mounting environmental concerns and services like CitiBike, Zipcar, Uber, and Lyft have revolutionized
global financial pressures are other forces pushing us toward collabo- ­transportation options. (MShieldsPhotos/Alamy Stock Photo; ­Metamorworks/
rative consumption (see Figure 1.5). Shutterstock; Mr.Whiskey/Shutterstock; Piotr Swat/Shutterstock)

Technology Connects Us with Others 35


Figure 1.5 Collaborative consumption means that we use networking to share a resource (for example, a car
or home) so many people can use the same object. (Montri Nipitvittaya/Shutterstock)

The Importance of Computer Literacy


Everywhere you go, you see ads for computers and other devices. Do you know what all the words in
the ad mean? What is a GPU? How fast do you need your computer to be, and how much memory
Helpdesk MyLab IT should it have? If you’re computer literate, you’ll be a more informed consumer when it comes time to
buy computers, peripherals, and technology services. Understanding computer terminology and keep-
Technology Impacts ing current with technology will help you better determine which computers and devices you need.
In this Helpdesk, you’ll play the
role of a helpdesk staffer fielding Computer Literacy
questions about ways in which
technology affects society.
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
Let’s look at a few examples of what it means to be a savvy computer user and consumer.
Computer literacy. When you are computer literate (see Table 1.2), you understand the capabil-
ities and limitations of computers and you know how to use them safely and efficiently. The topics
listed in Table 1.2 and more are covered in detail in the remaining chapters.
Avoiding hackers and viruses. Hackers and viruses can threaten a computer’s security. Being
aware of how they operate and knowing the damage they can cause can help you avoid falling prey
to them.
Protecting your privacy. If your identity is stolen, your credit rating can be quickly ruined. Do
you know how to protect yourself from identity theft when you’re online?
Understanding the real risks. Being computer literate means being able to separate real pri-
vacy and security risks from things you don’t have to worry about. Do you know whether cookies
pose a privacy risk when you’re on the Internet? Do you know how to configure a firewall for your
needs?
Using the web wisely. People who are computer literate know how to find reliable, accurate
information effectively. They also know how to use the web to work well with others. Are you effec-
tive in how you use the web?
Avoiding online annoyances. How can you avoid spam—unsolicited electronic junk mail? Do
you know what adware and spyware are? Do you know the difference between viruses, worms,

36 Chapter 1 The Impact of Technology in a Changing World


Table 1.2 What Does It Mean to Be Computer Literate?

You can avoid falling prey to hackers


You know how to protect yourself You can separate the real privacy and

and viruses because you are aware of from identity theft. security risks from things you don’t
how they operate. have to worry about.

You know how to find information and You can avoid being overwhelmed You can how to diagnose and fix prob-
use the web effectively. by spam, adware, and spyware. lems with your hardware and software.

(Peter Dazeley/The Image Bank/Getty Images; Yuri_Arcurs/E+/Getty Images; Zakai/DigitalVision Vectors/Getty Images; Justin Lewis/Stone/Getty Images; Argus/Fotolia; Ivanastar/
Istock/Getty Images)

and Trojan horses? What software—the instructions that tell the computer what to do—should you
install on your computer to avoid online annoyances?
Being able to maintain, upgrade, and troubleshoot your computer. Learning how to care
Sound Byte MyLab IT
for and maintain your computer and knowing how to diagnose and fix certain problems can save
you time and money. Do you know how to upgrade your computer if you want more memory? Do Virtual Computer Tour
you know which software and computer settings can keep your computer in top shape? Under-
In this Sound Byte, you’ll take a
standing the hardware of your computing system is a critical part of your computer literacy. (See
video tour of the inside of a desk-
the Virtual Computer Tour Sound Byte to get started.)
top system unit; locate the power
Keeping up to date. Finally, becoming computer literate means knowing about new technologies supply, CPU, and memory; and
and how to integrate them into your life. Can you connect your TV to your wireless network? What learn more about what’s inside a
is a media server, and do you need one? Can a USB type C connection carry HDMI video signals? computer.
Being able to stay up to date with technology is an important skill.
This book will help you become computer literate. In Chapter 3, you’ll find out how to get the most
from the web while staying free from the spam and clutter Internet surfing can leave behind on your
computer. Chapter 6 shows you how to determine whether your hardware is limiting your comput-
er’s performance and how to upgrade or shop for a new device. Chapter 9 covers how to keep
your computer and your digital life secure. You’ll be able to save money, time, and frustration by
understanding the basics of how computer systems operate.

Before moving on to Part 2:

1. Watch Chapter Overview Video 1.1.


2. Then take the Check Your Understanding quiz.

The Importance of Computer Literacy 37


Check Your Understanding // Review & Practice
For a quick review to see what you’ve learned so far, answer the following questions.

multiple choice
1. Which of the following organizations uses GIS b. subscriptions.
technology and mobile devices across its global c. crowdfunding.
operations?
d. collaborative consumption.
a. e-NABLE
4. Crowdfunding helps startup businesses by
b. The Witness Project
a. selling stock more easily.
c. United Nations World Food Program (WFP)
b. using QR codes to advertise and market products.
d. Next Einstein Initiative
c. gathering financial contributions from
2. Which of the following terms represents the difference supporters.
in the levels of Internet access and the availability of
d. replacing Web 2.0 technology.
technical tools in different parts of the world?
5. Collaborative consumption is when people get
a. social divide
together to
b. digital lag
a. find the best prices on products.
c. digital divide
b. increase the use of a single product by sharing
d. cognitive surplus access to it.

3. Nowadays, many companies, in a quest to improve c. fight diseases of the respiratory tract.
the quality of their products, take feedback from d. exchange reviews on services and goods they
­consumers using have purchased.
a. crowdsourcing.

chew on
this

Our thoughts are influenced by the information fed to our mind


all day long. Web 2.0 has created numerous channels for people
to offer their own work for free—open source software and free
music, text, and artwork, to name a few. How has this affected
your thinking, what you create, and what value you put on cre-
ative work?

(Steve Young/Fotolia)

MyLab IT Go to MyLab IT to take an autograded version of the Check Your


Understanding review and to find all media resources for the chapter.

For the IT Simulation for this chapter,


see MyLab IT.

38 Chapter 1 The Impact of Technology in a Changing World


Try This
What Does Facebook Know about You?
Social media sites like Facebook and Twitter do not charge you a fee. They make a profit
by selling information about your behavior to marketers. By watching what groups you
join and what posts you read, their algorithms make conclusions about what kind of
person you are. In this exercise we’ll show you how to check what information these
sites have deduced about who you are. For more step-by-step instructions, watch the
Chapter 1 Try This video on MyLab IT.

What You Need


A Facebook account A Twitter account

(rvlsoft/Shutterstock; Solomon7/Shutterstock)

Step 1 From the Facebook website, download your Facebook data. On the top line of your
Facebook page, click the dropdown arrow on the far right and select Settings. Next,
select Your Facebook Information and click Download Your Information. Click the
Create File ­button. Facebook will e-mail you when the file is ready.

(Used with Permission from Kendall Martin)

Step 2 From the Twitter website, download the information Twitter has created on you.
Click on your Twitter avatar and select Settings and privacy. From the list on the left,
select Your Twitter data. Scroll to the bottom and under Download your Twitter data,
and click the Request data button. It will be e-mailed to you when the report is ready.

Step 3 Examine what these algorithms have decided about you. Check the list of interests
and what items they think you will likely buy. How accurately have they guessed
your household income, your politics, and your finances?

Try This 39
Make This TOOL: IFTTT.com
(If This Then That)
A Virtual Assistant
If This Then That (IFTTT.com) is an Internet-based tool that helps you get things done automatically. By using
“recipes” within this web-based tool, you can automate tasks you do during the day, such as:
• automatically silencing your phone when you go into class,
• automatically texting your manager when you’re on your way to work, or
• notifying you when the president signs a new law.
In this exercise, you’ll explore using IFTTT to create recipes like these.
Make the Internet work for you by knowing this one programming statement: IF THIS, THEN THAT.

(IFTTT Inc.)
(IFTTT Inc.)

For the instructions for this exercise, go to MyLab IT.

40 Chapter 1 The Impact of Technology in a Changing World


Part 2 For an overview of this part of the chapter, watch Chapter Overview Video 1.2.

Emerging Technologies and


Ethical Computing
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence,
and how technology creates new ethical debates.

Can computing devices really think? Are virtual assistants like Alexa intelligent, or do they just mimic thinking? Rapid
developments in the field of artificial intelligence have forced us to consider many new ethical debates. It’s important to learn
about new advancements in technology, such as artificial intelligence, as well as to understand the ethical dilemmas technology
presents.

Artificial Intelligence
Artificial intelligence focuses on creating computer systems that have an ability to perform tasks
associated with human intelligence. Let’s explore in detail what artificial intelligence is and how it
impacts you.

Artificial Intelligence Basics


Objective 1.6 Describe artificial intelligence systems and explain their main goals.
What exactly is intelligence? Intelligence is the ability to acquire and apply knowledge and
skills. Sociologists point to characteristics that make human beings intelligent, such as learning from
experiences, reasoning, problem solving, perception, and using language. Animals can exhibit com-
plex behavior, such as birds flying south for the winter, but this is attributed to instinct rather than
intelligence. Some animals can even solve problems, such as sea otters that use rocks to crack
open shellfish so they can consume them. But what separates us from other animals is the ability to
combine behaviors as opposed to demonstrating one specific rote behavior (such as flying south for
the winter).

What is artificial intelligence? Artificial intelligence (AI) is a branch of computer science that MyLab IT
Helpdesk
focuses on creating computer systems able to perform tasks that are usually associated with
human intelligence. By this definition, any computer-controlled device that accomplishes something The Impact of Artificial
thought of as “intelligent” by humans is considered AI. Intelligence
Do computers “think” like human beings? In the 1950s, the goal was to create a machine In this Helpdesk, you’ll play the role
that could think like a human. Early examples included expert systems that mimicked doctors in of a helpdesk staffer, fielding ques-
diagnosing illnesses. But this goal has shifted somewhat toward creating machines that generate tions about artificial intelligence.
intelligent output but that do not necessarily mimic the human thought process.

Consider visiting the library. You could tell a human librarian your interests and the librarian could
ask you some questions and then recommend books you might like. The Amazon recommendation
engine fulfills the same purpose. However, the Amazon recommendation engine doesn’t mimic a
human librarian’s thought process but instead analyzes vast amounts of data about you and other
shoppers to make its recommendations. It provides intelligent results, but it does not arrive at those
results the same way a human would.

  Artificial Intelligence 41
What are the main areas of research for AI? AI’s central goals can be grouped into a num-
ber of categories (see Table 1.3):
• Natural language processing (NLP): NLP works to develop AI systems that understand written
and spoken words and can interact with humans using language.
• Perception: AI systems have senses just as we do. AI systems use sonar, accelerometers,
­infrared, magnetic, and other electronic sensors to gather data. Being able to combine all the
data from sensors and then construct information from it is a difficult challenge.
• Knowledge representation: Knowledge representation involves encoding information about
the world into formats that the AI system can understand. Humans possess a vast collec-
tion of general knowledge based on their experiences in the world. AI systems need to build
knowledge bases to solve problems. Developing a knowledge base and using it efficiently are
active areas of research and have been demonstrated effectively by IBM’s artificial intelligence
­computer Watson.
• Planning: AI systems need to set goals and then achieve them. An AI system might need to plan
how to move a blue block out of the way to reach a red one or how to rotate a block as it moves
to fit through a narrow opening.
• Problem solving: Humans tend to make intuitive judgments when solving a problem rather than
perform a step-by-step analysis. AI programming combines a rules-based approach, along with
trying to make judgments with incomplete information.
• Learning: Like humans, AI algorithms adapt and learn through experience. ­Supervised ­learning
is used when the system can be trained with a huge number of examples. U ­ nsupervised ­learning is
when a system can look at data and build rules on its own to decide what it is seeing.

Table 1.3 Main Areas of AI Research


Natural Language Processing Perception Knowledge Representation

Understanding Using sensors to gather data Storing and accessing


Written and spoken words information about the world

Planning Problem Solving Learning

Goal must be set Using even incomplete information Improve through


and achieved to achieve solution experience

(Convisum/123RF; Andrija Markovic/123RF; Galina Peshkova/123RF; Viktor Bondar/123RF; Tomertu/123RF; Sentavio/123RF)

42 Chapter 1 The Impact of Technology in a Changing World


A project like a self-driving (autonomous) car requires research in many of these areas. The car must
have computer vision—the ability to interpret visual information the way humans do. The AI system
needs to be able to tell the difference between trees and pedestrians, but it also needs to know
many things about trees and people. Is the tree going to run into the path of the car? The car must
scan the scene with sensors, recognize objects, and consult a knowledge base to create and exe-
cute a plan.

What has enabled us to deploy effective AI systems? Many information technology devel-
opments have contributed to the functional AI systems that we have today.

Artificial Neural Networks


Expert systems, computer programs that mimic the experience of human experts such as doctors
or lawyers, were among the first attempts at producing AI. Rules-based systems, software that
asks questions and responds based on preprogrammed algorithms, were the first expert systems
designed. These systems asked questions (“Do you have a fever?”) and initiated other questions
or actions based on the answers (“How long have you had a fever?”) and worked adequately for
some settings. But just a list of rules is not sophisticated enough to handle difficult tasks.

Artificial neural networks (ANNs) are designed based on the structure of the human brain (see
­Figure 1.6), which is a network of loosely connected neurons. When signals are received by a
­neuron, it fires an electrical impulse and the signal travels to all the neurons connected to it. In
ANNs, digital signals take the place of biological signals. Many modern ANNs feature different lay-
ers of neurons that allow many degrees of complexity. ANNs have allowed researchers to tackle
complex problems such as speech recognition.

Machine Learning
Machine learning (ML) is a type of AI that doesn’t need to be specifically programmed. Instead, it
analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the
AI system accordingly. By learning, the AI system can adapt itself and become constantly better at
its task. You have interacted with these kinds of systems if you use Alexa, the Amazon voice recog-
nition device. Alexa gathers input from human speech and uses this information to become better
at understanding language over time.

Deep learning (DL) is a subset of the ML field that describes systems capable of learning from
mistakes, just as humans do. DL algorithms can learn from data that is not labeled as “correct” or
“incorrect.” The algorithm adapts to improve its final result without being presented with a huge,
labeled set of training data. This is known as unsupervised learning.

Having a basic understanding about AI systems is necessary to becoming a digitally literate citizen.
In the next section, we’ll explore various workplace systems that use AI.

Figure 1.6 Human neurons can either send a signal or


block one. Artificial neurons mimic this behavior
digitally. (LuckyStep48/Alamy Stock Photo)

  Artificial Intelligence 43
Another random document with
no related content on Scribd:
“Pull him inside and shut the door,” Evan snapped. “I—er—find in
myself a certain adaptability.... Put on your wrap and hat. Hurry....
The front way. Keep out of sight. Can you drive a car?”
“Yes.”
“If one is standing in front—steal it.”
“Yes.”
“Now—go.”
“I—Oh, Evan.”
She was in his arms, and her lips to his. “I—If they kill you I shall die,
too.”
He opened the door and stared into the dimly lighted hall. “It is clear.
Go.”
“Good-by.”
“Go. You’re wasting time.” He pushed her through the door. “Our
best hope is that they—to my surprise—have underestimated me....
Good-by.... I—er—seem to have underestimated myself.... I seem to
have been—exceptionally inefficient in a field quite foreign to my
previous activities. Hasten.”
He shut the door and Carmel stood alone, dependent upon herself,
without other hope or reliance than in her own expedients. She
moved softly down the hall, reached the top of the stairs which led
downward to another hall and the front door. She listened. There
was no alarming sound.... She descended halfway and stopped
again. The lower hall, apparently, was in the middle of the house. To
the left was the room which had been the bar in the days when liquor
might be sold openly; at the right was the dining room. The door to
the dining room was closed; that into the bar stood open—and there
was her danger. She must pass that door without being seen. Once
outside, the danger decreased almost to a minimum. Could she
reach the shelter of the woods, she felt she would be safe.
She crept downward; reached the ground floor and flattened herself
against the wall. What if the front door should open and somebody
should enter?... She hesitated, then peered cautiously through the
door and into the bar.... As she did so she heard an automobile drive
up in front and stop.... In the bar she saw Peewee Bangs sitting, his
feet on a table, reading a newspaper.
Feet ascended the steps outside, and she cowered. A hand rattled
the knob, and she heard Bangs drop his feet to the floor, with the
scrape of his chair as he turned.... The door opened. Something, not
conscious volition, moved Carmel. As the door opened and a man
stepped in, she sprang forward, brushed past him, and ran down the
steps. Behind her she heard a shout—the squeaky voice of Peewee
Bangs.... Before her stood a Ford, its engine agitating the whole car,
and she ran toward it and threw herself into the seat. In an instant
she had grasped the wheel and adjusted her foot to the clutch....
Then she was conscious of a jar, and out of the corner of her eye
saw Bangs’s face, distorted with rage, saw his hand reaching for her
arm.... She screamed. Then her hand, chance led, fell upon the seat,
encountered a heavy wrench.... She lifted it, dashed it with all her
strength into that inhuman face.... It vanished.... The next thing of
which she became clearly conscious was of speed, of a rocking,
bounding car.... She was free, had escaped her pursuer, and was
rushing with every ounce of power the little car possessed toward
Gibeon....
Was there a car to follow her? A larger, more powerful, faster car?...
She did not know. She glanced behind. There was nothing yet, no
pursuing headlight. Carmel gripped the wheel and threw down the
gas lever to its final notch.... Around corners, through puddles, over
patches rutted by heavy wheels, she forced the little car. It rocked,
skidded, threatened, but always righted itself and kept on its way....
She looked behind again.... Headlights!... By this time she must be
half a mile or more from the hotel. It would be a good car which
could make up that lead in the short distance to Gibeon.... Yet, as
she looked back from time to time, the headlights drew closer and
closer.... She could see straggling lights now—the fringe of the
village.... Would they dare follow her into the town itself? She fancied
not.... The bridge lay before her—and the pursuing car roared not a
hundred yards behind. She swept across the river and sped down
Main Street at a rate never witnessed before by that drowsy
thoroughfare.... She was safe.... Before her was the Town Hall—
lighted brightly.... She looked back. The pursuing car was not to be
seen.
The town meeting! The citizens of Gibeon were there upon the
town’s business. She brought the car to a stop before the door,
leaped out, and ran up the stairs. The hall was crowded. On the
platform stood the chairman of the town board.... Carmel was
conscious of no embarrassment, only of the need for haste, of the
necessity for finding help. She entered the room and made her way
up the aisle to the platform. Without hesitating she mounted the
steps, unconscious of the craning of necks, the whisperings, the
curiosity her arrival was causing.
The chairman halted in his remarks. Carmel, in her excitement,
ignored him, almost shouldered him aside.
“Men—men of Gibeon,” she said, “crime is being committed,
perhaps murder is being done, at this minute.... What are you going
to do?”
CHAPTER XXVI
THE hall was still. It was as if, by some necromancy of words,
Carmel had turned to stone the town meeting of Gibeon. She looked
down into faces which seemed to her white and strained. The faces
waited. She had caught them by her words; gripped them.
Something was about to happen. Every man in the room felt the
imminence of grave events. The very air tingled with it as if waves of
some vital force agitated the air and discharged themselves with
such force as to be felt by physical touch.... It was Carmel Lee’s first
public appearance, yet she was not frightened. Rather she was
eager; words jostled with one another for the privilege of being
uttered first. She paused, staring down into those faces.
“Men of Gibeon,” she said, and her little fist, clenched with knuckles
showing white, lifted from her side and extended itself toward them,
“Men of Gibeon, I have found the body of Sheriff Churchill.... He was
murdered!...”
The faces seemed to move in unison as if they were painted upon a
single canvas and the canvas had been suddenly jerked by an
unseen hand. They became audible by an intake of the breath.
“I found him,” Carmel said, “close by the Lakeside Hotel.... Since
yesterday I have been a prisoner in the Lakeside Hotel, I and Evan
Pell.... I went to find him. I found Sheriff Churchill; I saw five great
trucks unload in the hotel yard, and those trucks were carrying
whisky from the other side of the border.... It was whisky, men of
Gibeon, which killed Sheriff Churchill. It was the men who are
trafficking in liquor who murdered him.... I know their names. I have
seen them and been their prisoner.... At this moment Evan Pell,
locked in a room of that unspeakable place, is in danger of his life.
He is injured, cannot escape nor defend himself. Yet he made it
possible for me to escape and to come to you for help....” Again she
paused.
“I could not go to the law because the law does not belong to the
people of Gibeon. It has been bought and paid for. It is owned by
criminals and by murderers.... We have a new sheriff.... That man’s
hands are red with the blood of the man whose place he fills.... So I
have come to you, for there is no other law in Gibeon to-night than
yourselves.”
There had been no movement, no sound, only that tense, fateful
silence.
“Will you permit this thing? Will you continue to allow your town and
your county to rest under this dreadful thing? You can stop it to-night.
You can wipe it out forever.... Let me tell you what I know.”
She spoke rapidly, eloquently. In that moment she was no longer a
young woman, but a leader, a prophet, one sent to deliver a
message, and she delivered it fittingly. Her words descended upon
those upturned faces, compelling belief. There could be no doubt....
She described the plot against herself as Bangs had recited it
tauntingly—how she was to have been made a thing to scorn and to
turn aside from; how that part of her which was more valuable to her
than life itself was to have been murdered. At the recital the faces
moved again, became audible again in a murmur which held kinship
with a snarl.... Gibeon was awakening.
Point by point, fact by fact, she drove home to them the conditions
among which they had been living, but one name she withheld until
the moment should come for its utterance.... She described the
activities of the whisky smugglers, the workings of their organization,
its power—the intelligence which directed it.
“Will you endure this, men of Gibeon?... No time may be lost. At this
instant a man stands under the shadow of death! What are you
going to do? Will you let him die?”
In the hall a man arose. “What is the name of this man—the man
who is to blame for all this?” he demanded.
“His name,” said Carmel, “is Abner Fownes!”
It was as if they had expected it; there was no demonstration, no
confusion. The men of Gibeon were strangely unmoved, strangely
silent, strangely stern. It was as if they were moved by a common
impulse, a common determination. They were not many individuals,
but a single entity.... They had been molded into solidity—and that
solidity was Gibeon.
The faces were faces no longer, but human beings, men standing
erect as if waiting for a signal.... Among them Carmel saw Jared
Whitefield. His eyes encountered hers, and he nodded....
“Will you come with me?” she cried. “Will you follow me?... Those
who will follow—come!...”
She descended from the platform and a lane opened before her; she
reached the door and turned.... The men of Gibeon were behind her,
and as if they were a company marching behind its commander they
followed her down the stairs. There was no shouting, no confusion,
no unsightly mob spirit.... Along the street stood waiting cars, the
cars of the farmers of the town, and men crowded into them beyond
their capacity.... It was a crusade, the crusade of Gibeon, and
Carmel had preached it.
They started quietly, grimly, an orderly procession. It moved through
the streets, across the bridge, and out the road toward the Lakeside
Hotel.... A hundred men bent upon purging their community of a
thing which had debauched it.... On and on, urgent, inexorable,
moved the line of cars.... Then a sudden stop. The road was
barricaded, and men with rifles stood behind to block the way.
“What’s this here?” bellowed a voice out of the darkness. “What kind
of goin’s on is this here?” It was Sheriff Jenney.
There was no answer. “I order ye to disperse and git to your homes
quietly,” he said. “We hain’t goin’ to have no mobbin’ in Gibeon.”
The cars emptied and men crowded forward. “Out of the way,
Jenney,” a voice commanded. “We’re in no humor to be meddled
with to-night.”
“Don’t go resistin’ an officer,” Jenney roared. “Disperse like I told ye.”
Then Jared Whitefield forced his way to the front, and on either side
of him were strangers to Gibeon. They leaped the barricade before
Jenney, taken by surprise, could move his hand. Whitefield dropped
a heavy hand on Jenney’s shoulder.
“Jenney,” he said, “drop that gun. You’re under arrest.”
“Arrest!... Me? Who kin arrest the sheriff of a county.” He laughed
loudly.
“I can,” said Whitefield. “Drop that gun.”
Jenney twisted in Whitefield’s grip, but the huge man held him as in
a vise.
“You’ve gone ag’in’ somethin’ bigger than a township or a county,
Jenney, or even a state.... It’s the United States of America that’s
puttin’ you under arrest, Jenney, through me, its duly appointed
marshal.... Drop that gun!”
The United States of America! The Federal authorities had taken a
hand. That explained Whitefield’s absence.... The United States!...
Carmel sobbed. In this thing she had the might of America behind
her! The authority of a nation!
“Put him in a car,” Whitefield directed his companions; and it was
done.
“Whitefield,” called a voice, “you hain’t goin’ to interfere? You hain’t
goin’ to stop us?”
“I got nothin’ to do with you,” Whitefield said. “I got what I come for.”
The cars filled again, the obstruction was removed, and once again
the men of Gibeon moved toward their objective. They reached it,
surrounded it, men burst in its doors and laid hands upon whomever
they found.... Carmel, well escorted, ran up the stairs.
“That’s the door,” she cried, and powerful shoulders thrust it from its
hinges.
“Evan!...” she cried. “Evan!...”
He lay upon the floor, motionless. Carmel knelt beside him, frantic at
the sight of his motionlessness. She lifted his head to her lap, peered
into his white face, stared at his closed eyes.
“They’ve killed him,” she said, in a dull, dead voice. “We’ve come too
late.”
Mr. Hopper, of the Gibeon bank, thrust his hand inside Evan’s shirt to
feel for the beating of his heart.... It was distinguishable, faint but
distinguishable.
“He’s not dead,” said Hopper, “but somebody’s beat hell out of him.”
They lifted him gently and carried him down the stairs. Carmel
walked by his side, silent, stunned.... He was not dead, but he was
horribly injured. He would die.... She knew she would never again
see his eyes looking into hers. They placed him in a car, and she sat,
supporting his weight, her arm about him, his head heavy upon her
breast....
“Everybody out?” roared a voice.
“Everybody’s out!”
Carmel saw a light appear inside the hotel, a light cast by no lamp or
lantern.... It increased, leaped, flamed. Room after room was
touched by the illumination. It climbed the stairs, roared outward
through windows, spreading, crackling, hissing, devouring.... In a
dozen minutes the Lakeside Hotel was wrapped in flame—a beacon
light in Gibeon’s history. High and higher mounted the flames until
the countryside for miles about was lighted by it, notified by it that a
thing was happening, that Gibeon was being purified by fire.
“Is there no doctor here?” Carmel cried.
“Doc Stewart’s some’eres.... I’ll git him.”
The doctor was found and came. He examined Evan as best he
could. “Better get him to town. Can’t tell much now.... Depends on
whether there’s concussion.... I’ll go along with you.”
“Before you go, Miss Lee—where—is the sheriff? Sheriff Churchill?”
“Follow the shore—that way. You’ll find him—on the edge.”
“We got Peewee Bangs—he was hidin’ in a boat-house.”
“I—I’m glad,” said Carmel.
The car moved away, bearing Carmel, Evan, and the doctor.
Somehow it seemed like the end of the world to her—a definite
stopping place of things. The lurid flames making a ghastly forest,
black figures flitting about from shadow to shadow, the confusion of
her thoughts, the piling up for days of event upon event and emotion
upon emotion—all this seemed to be a climax—a finality. There was
an unreality about it all, an unnatural crowding of events, a hustling
and jostling, as if she were in an overwrought throng of occurrences,
adventures, events, crises which pushed and shoved and harried
her, striving ever to thrust her out of their way that they might march
unimpeded. There rested upon her now a curious listlessness, a
lifelessness, as if they had succeeded, as if they had elbowed her off
the road of life, upon which she could never regain a footing.
Gibeon was aroused; Gibeon was crusading! The thought awakened
no thrill. She was safe; never again would she be threatened by the
forces which she had challenged. She was free to pursue her way—
but the knowledge came as dead knowledge. She did not care. She
cared for nothing—because she knew, she was positive, Evan Pell
had gone from her forever....
The car stopped before the doctor’s house and Evan was carried up
to a bedroom, unconscious still.... Doctor Stewart tried to exclude her
from the room, but she would not be excluded. This was all she had
left; all life held for her—that faint, irregular beating of Evan Pell’s
heart.... She knew those heartbeats were her own, would be her own
so long as they persisted.... She would remain would sit by him
watching, watching, waiting. This scarcely perceptible life was all she
would ever have of him, and she dared lose no instant of it.
Doctor Stewart worked over the bed. Carmel thought him calm,
terribly indifferent, businesslike. He was a tradesman working at a
trade when she would have had him a god performing a miracle....
After a time he turned to her.
“I cannot tell,” he said. “Some concussion is present. There seems to
be no fracture of the skull.... What internal injuries he may have
suffered—it is impossible to say.... In the morning....”
“He will be dead,” said Carmel.
The doctor shook his head. “I do not think so. I hope—in such cases
one cannot be sure—but——”
“He will be dead,” said Carmel.
“It is in God’s hand,” said the doctor.
“They have killed him—because he was brave, because he loved me
—because—— Oh, Doctor, that is the awful thought—he is dead for
me. He gave his life for me.”
His hand rested upon her shoulder with the gentle touch which some
men learn by a life of service—and Doctor Stewart, country
physician, unrecognized, unsung, had lived such a life. “My dear,” he
said, “how better could a man die?”
“He killed him—Abner Fownes killed him.”
“Abner Fownes has run his course,” said the doctor.
“It is not enough—not enough. The law can do nothing to him which
will make him pay.”
“The punishment of the law,” said the doctor, “is a puny thing beside
the punishment of God.”
Carmel stood up; she bent over the bed and kissed Evan upon the
cold lips.... Something possessed her, controlled her, a power
stronger than herself, an impulse more urgent than she had ever
known. It moved her as if she were an automaton, a puppet ordered
and regulated by strings in the hands of its fabricator. She moved
toward the door.
“Where are you going?” asked the doctor.
“I have a thing to do,” she said.
He peered into her face and saw there that which shocked him,
startled him. He would have stayed her. “Wait——” he commanded.
She eluded his outstretched hand and hurried down the stairs. There
was no indecision in her step or in her manner. There was no
indecision in her soul. She knew where she was going, and why she
was going.... She was on her way to find Abner Fownes!
CHAPTER XXVII
ABNER FOWNES was sitting in his library waiting for word from
Sheriff Jenney. If matters went to-night as he felt certain they must
go, he could live again in security, untroubled by conscience, with no
apprehensions, and with his financial worries removed. Five
truckloads of liquor had been discharged at the Lakeside Hotel. He
knew that. The importation had been successful, without a hitch.
Within a week the whisky would be distributed and the cash in
hand.... It would be sufficient to clear his most troublesome
obligations and to put him on his feet again. He considered this with
a glow of satisfaction....
Carmel Lee had constituted a threat, but she was powerless to
threaten now. At any moment word would arrive that she was in
Jenney’s hands, her reputation in Gibeon would be destroyed, and
she would be powerless. Public opinion would drive her from the
place.
Abner sat back comfortably in his chair and looked forward to a life
of quiet and importance. He would continue to live in security as
Gibeon’s first citizen. He might even seek political preferment. In a
year there would be a senatorial election. Why should he not stand
for the position. To be Senator from his state—that was something,
indeed. And why not? His reflections carried him to Washington. He
saw himself in the Senate Chamber, listened to his voice rolling forth
sonorous periods, heard with infinite satisfaction the applause of his
fellow Senators....
The telephone rang and he was guilty of unseemly haste to reach
the instrument.
“Hello!... Hello!... Who is it? Is it Jenney?”
“No,” said a voice, “it’s Deputy Jackson.... Look out for yourself....
There’s hell——”
“What’s that?”
“The whole town meetin’s rushin’ off to Peewee’s place. Reg’lar
mob.... Jenney he set out to stop ’em, but he’s arrested.”
“Jenney arrested!”
“Federal authorities. Him and two others is pinched. Better look out
for yourself. I’m goin’ to.”
The receiver banged on its hook at the other end of the line. He was
alone. Washington vanished, glowing dreams of the future gave
place to the grim reality of the present. The Federal authorities!... He
had considered them negligible. Somehow one lost sight of the
Federal government in that remote region; they were unfamiliar; it
seemed a spot to which their writ did not run.
He tried to consider the fact coolly and calmly, but his brain refused
to function in such a manner. He was confused; the suddenness, the
unexpectedness of the blow from such a source shook him from his
foundations. What did it mean? How had it come about.... Clearly, if
Jenney was under arrest, he could not complete his raid on the
Lakeside Hotel and so abolish Carmel Lee.... That was that.... But
how did it affect him? How did it affect the thousands of dollars’
worth of liquor so necessary to his financial rehabilitation?...
The big question—was he threatened personally?—was one he
could not answer. There had been no sign of threat. Jenney was
arrested. Perhaps they did not mean to arrest him, had no evidence
against him.... But could Jenney be depended upon to keep his
mouth shut?... Jenney, he confessed to himself, did not seem a man
capable of great loyalty, nor possessed of high courage. He would
weaken. Under pressure he would tell all he knew.... The advice of
the voice over the telephone was good. He would look out for
himself....
He rushed up the stairs to make ready for flight. It would be a good
idea to absent himself, no matter what happened. If worst came to
worst—why, he would be out of reach of the law. If matters turned
out otherwise it would be easy to return from a hurried business
trip.... He began packing frantically. Having packed, he went to the
safe in his library and transferred sufficient funds to his pocketbook.
Then, as a precautionary measure, he carefully destroyed certain
private papers.... This consumed time.
The telephone rang again, and Abner answered in no little
trepidation.
“Mr. Fownes?” asked a voice.
“Yes. Who is it?”
“Tucker.... Say, the mob’s burned Lakeside Hotel. They’ve got
Peewee.... Burned her up slick and clean—and everythin’ in it. The
whole shipment’s gone....”
Fownes dropped the receiver and sank nerveless into a chair. At any
rate, he was ruined. That much was certain. Nothing remained to
fight for now but his personal security, his liberty. He snatched up his
bag and moved toward the door.... His plan was not clear—only the
first step of it. He would rent an automobile and drive out of town
with what speed was possible.... As he reached the door he realized
with a sudden sharp pang that he was leaving his house for good,
leaving Gibeon forever. He, Abner Fownes, first citizen, man of
substance, was fleeing from his native place like the commonest
criminal.
Dazedly he wondered how it had come about ... somehow, he felt,
that girl was at the bottom of the thing. His misfortunes were due to
her meddling. He wished he could get his fingers upon her throat.
He descended the steps and walked toward the street. The night
was dark, dark enough to conceal his movements, perhaps to avert
recognition.... A certain confidence came to him. He would get away;
he would possess liberty and his intelligence which had served him
so well.... There were other places—and he was not old. Perhaps....
As he turned out upon the street a figure confronted him. He halted,
drew back.
“Abner Fownes,” said a voice, “where are you going?”
“You!... You!...” he said, hoarsely. His fingers twitched, fury burned in
his heart, and the desire to slay. He looked about him. All was
blackness.... Here she was, this girl who was sending him crashing
down in ruin....
“He is dead,” said Carmel. “You are a murderer again. Abner
Fownes.... You’re running away.”
“Out of my way, you—you——”
“You’ve killed him,” she said. “You must be punished for that.... You
must not go away. You must wait until they come.”
“You—you’ve done this—you——” He was working himself into a
rage. He was not the man to do a violence in cold blood.
“I have done it.... But to what good? He is dead—is dying.... Nothing
can pay for that. He will go away from me forever.... Abner Fownes,
you are a murderer, and you must pay for it.... Oh, if I could make
you pay a thousand, thousand times.... And you shall pay!”
He dropped his bag and reached for her throat with clutching fingers.
She stepped back, avoiding him.
“They are coming now,” she said. “See.... There are their lights....
Wait, Abner Fownes. You cannot get away. If you try to go I shall
hold you.”
He turned. Up the road approached a multitude of automobile lights.
Gibeon was returning from its crusade!... He uttered a shrill,
unnatural cry and made as if to rush past her, but Carmel grasped
his arm. “Wait,” she said.
He waited. A feeling of powerlessness swept over him. A sense of
impotence and defeat and despair.... He could not force himself to
raise his hand against this girl. He was afraid. He was afraid of her.
She remained standing in the middle of the walk, blocking his way,
but it was unnecessary to block his way. He could not have moved....
A cold, clinging dread was upon him. He was afraid of the night, of
the darkness. He dared not be alone with the night.... If Carmel had
gone Abner Fownes would have followed her, would have called her
back, begged her to stay with him....
The lights of the first car rested upon them, illuminating the spot....
Carmel stepped forward and signaled. The car stopped, halting the
procession.... Men got down and surrounded him....
“Where,” said Carmel, “is Sheriff Churchill?”
“There,” said a man.
“Carry him here,” she ordered, and it was done.
Wrapped in blankets, the thing that had been Sheriff Churchill was
laid on the sidewalk at Abner Fownes’s feet.
“Uncover his face. Let this man look at him,” Carmel said. “Make him
look.... Make him look....”
Fownes covered his face, staggered back. “No.... No.... Take—take it
away.”
“Uncover his face,” said Carmel. “Take this man’s hands from his
eyes.... Make him look....”
They obeyed. Fownes stood quivering, eyes tightly shut.
“Look,” said Carmel. “Look!”
She overmastered him. He opened his eyes and looked at the
dreadful sight. He stared, bent forward. His hands stretched out,
clawlike, as he stared at the horror. Then he threw back his head
and laughed, and the laughter ended in a shriek.... He swayed, half
turned, and fell back into the arms of the men of Gibeon....
Jared Whitefield forced his way to Fownes’s side. “I will take charge
of him,” he said. “Will some one take care of this girl.... She hain’t
herself.... Take her back to Doc Stewart’s....”

Morning penetrated the room where Carmel sat, entering gently,


gently pushing back the night. Carmel sat wide-eyed, waiting,
waiting. She had not slept, had not closed her eyes. From time to
time she had climbed the stairs to look upon Evan Pell’s face, to be
told that he lived, that his condition was unchanged.... She was
worn, weary. Nothing mattered now. She was at the end of things,
wishing for death.
Doctor Stewart came to the door.
“Can you step upstairs, Miss Lee?”
“Is—is he——”
The doctor shook his head.
Carmel followed. Doubtless he was sinking, and she was summoned
to be present at the end.... She entered the room. Her heart was
cold, heavy, dead. As she approached the beside she could not lift
her eyes to Evan’s face.
“Carmel—dear....” said a voice.
Her heart came to life; it warmed, leaped in her bosom. She dared to
look. His eyes were open, conscious, intelligent.
“Evan!... Evan!...” she cried and sank on her knees beside him. Her
eyes devoured his face, and he smiled.
“Doctor—Doctor,” she cried, “is he—will he——”
“I think,” said the doctor, “we can have him on his feet in a week,
slightly damaged, of course.”
“And I thought—I thought you would die,” she said.
“Die!” Evan Pell’s voice, weak and faint, nevertheless carried a note
of surprise. “Er—of course not. I had not the slightest intention—of
dying.” He fumbled for her hand. “Why my dear—I have—just come
to—life.”
“You would have given your life for me!... Oh, Evan, I love you! ...
and I’m so—so proud of you.”
“Er—very gratifying,” said Evan. Then, for a moment he was silent,
reflecting.
“It is—very satisfying to—be in love,” he said. “I—like it.” Then. “I
want you to—be proud—of me.” He smiled. “There’s just—one thing
—I am proud of.”
“What is that, sweetheart?”
“The—er—way I—handled that doorknob—with so little practice,” he
said. “It was—er—so foreign to my training.... It—showed
adaptability....”
THE END
TRANSCRIBER’S NOTES:
Obvious typographical errors have been corrected.
Inconsistencies in hyphenation have been
standardized.
Archaic or variant spelling has been retained.
New original cover art included with this eBook is
granted to the public domain.
*** END OF THE PROJECT GUTENBERG EBOOK CONTRABAND
***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE

You might also like